A Deep Neural Network Attack Simulation against Data Storage of Autonomous Vehicles

被引:0
作者
Kim, Insup [1 ]
Lee, Ganggyu [1 ]
Lee, Seyoung [2 ]
Choi, Wonsuk [2 ]
机构
[1] Samsung Elect, Memory Div, Hwasung, South Korea
[2] Korea Univ, Sch Cybersecur, Seoul, South Korea
来源
SAE INTERNATIONAL JOURNAL OF CONNECTED AND AUTOMATED VEHICLES | 2024年 / 7卷 / 02期
关键词
Automotive cybersecurity; Data storage system for automated driving (DSSAD); Threat analysis and risk assessment (TARA); Deep neural network (DNN); Parameter manipulation attack; Attack simulation; SECURITY;
D O I
10.4271/12-07-02-0008
中图分类号
U [交通运输];
学科分类号
08 ; 0823 ;
摘要
In the pursuit of advancing autonomous vehicles (AVs), data-driven algorithms have become pivotal in replacing human perception and decision-making. While deep neural networks (DNNs) hold promise for perception tasks, the potential for catastrophic consequences due to algorithmic flaws is concerning. A well-known incident in 2016, involving a Tesla autopilot misidentifying a white truck as a cloud, underscores the risks and security vulnerabilities. In this article, we present a novel threat model and risk assessment (TARA) analysis on AV data storage, delving into potential threats and damage scenarios. Specifically, we focus on DNN parameter manipulation attacks, evaluating their impact on three distinct algorithms for traffic sign classification and lane assist. Our comprehensive tests and simulations reveal that even a single bit-flip of a DNN parameter can severely degrade classification accuracy to less than 10%, posing significant risks to the overall performance and safety of AVs. Additionally, we identify critical parameters based on bit position, layer position, and bit- flipping direction, offering essential insights for developing robust security measures in autonomous vehicle systems.
引用
收藏
页数:18
相关论文
共 65 条
[1]  
[Anonymous], 2021, 214342021 ISOSAE
[2]  
[Anonymous], 2017, NVM Express
[3]  
ARMOR, A Run-Time: Memory Hot-Row Detector
[4]   Making the Case for Centralized Automotive E/E Architectures [J].
Bandur, Victor ;
Selim, Gehan ;
Pantelic, Vera ;
Lawford, Mark .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (02) :1230-1245
[5]  
Cai Y, 2018, Arxiv, DOI arXiv:1805.03291
[6]   Vulnerabilities in MLC NAND Flash Memory Programming: Experimental Analysis, Exploits, and Mitigation Techniques [J].
Cai, Yu ;
Ghose, Saugata ;
Luo, Yixin ;
Mai, Ken ;
Mutlu, Onur ;
Haratsch, Erich F. .
2017 23RD IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE (HPCA), 2017, :49-60
[7]  
Cai Z., 2019, Black Hat USA, V2019, P1
[8]   ProFlip: Targeted Trojan Attack with Progressive Bit Flips [J].
Chen, Huili ;
Fu, Cheng ;
Zhao, Jishen ;
Koushanfar, Farinaz .
2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2021), 2021, :7698-7707
[9]  
Choi J., 2021, Crash the Flash: An End-to-End Rowhammer Attack on an NAND Flash System
[10]   A historical perspective of explainable Artificial Intelligence [J].
Confalonieri, Roberto ;
Coba, Ludovik ;
Wagner, Benedikt ;
Besold, Tarek R. .
WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY, 2021, 11 (01)