Potential cyber threats of adversarial attacks on autonomous driving models

被引:11
作者
Boltachev, Eldar [1 ]
机构
[1] Financial Univ Govt Russian Federat, Dept Data Anal & Machine Learning, 4-Th Veshnyakovsky Passage,4, Moscow 109456, Russia
关键词
Autonomous vehicle; Adversarial attack; Autonomous driving model; Deep neural network; VEHICLES; SAFETY;
D O I
10.1007/s11416-023-00486-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Autonomous Vehicles (CAVs) are currently seen as a viable alternative to traditional vehicles. However, CAVs will face serious cyber threats because many components of the driving system are based on machine learning models and are vulnerable to adversary attacks. We have reviewed the scientific literature and highlighted the main types of disruptive attacks on autonomous driving models that pose potential threats to CAVs. In this paper, we have compiled a dataset with traffic sign images obtained from public sources. We made experiments in which we distorted the original images and used them to train deep neural network-based classification models. The experiments demonstrated a possible threat to traffic sign recognition by autonomous vehicles. This work can give researchers and engineers a better understanding of the current state and trends in CAV security for their future use.
引用
收藏
页码:363 / 373
页数:11
相关论文
共 41 条
[1]   A Security-by-Design Decision-Making Model for Risk Management in Autonomous Vehicles [J].
Abdel-Basset, Mohamed ;
Gamal, Abduallah ;
Moustafa, Nour ;
Abdel-Monem, Ahmed ;
El-Saber, Nissreen .
IEEE ACCESS, 2021, 9 :107657-107679
[2]   Square Attack: A Query-Efficient Black-Box Adversarial Attack via Random Search [J].
Andriushchenko, Maksym ;
Croce, Francesco ;
Flammarion, Nicolas ;
Hein, Matthias .
COMPUTER VISION - ECCV 2020, PT XXIII, 2020, 12368 :484-501
[3]   Intelligent System for Estimation of the Spatial Position of Apples Based on YOLOv3 and Real Sense Depth Camera D415 [J].
Andriyanov, Nikita ;
Khasanshin, Ilshat ;
Utkin, Daniil ;
Gataullin, Timur ;
Ignar, Stefan ;
Shumaev, Vyacheslav ;
Soloviev, Vladimir .
SYMMETRY-BASEL, 2022, 14 (01)
[4]   Transformation Method for Solving System of Boolean Algebraic Equations [J].
Barotov, Dostonjon ;
Osipov, Aleksey ;
Korchagin, Sergey ;
Pleshakova, Ekaterina ;
Muzafarov, Dilshod ;
Barotov, Ruziboy ;
Serdechnyy, Denis .
MATHEMATICS, 2021, 9 (24)
[5]   Attacking vision-based perception in end-to-end autonomous driving models [J].
Boloor, Adith ;
Garimella, Karthik ;
He, Xin ;
Gill, Christopher ;
Vorobeychik, Yevgeniy ;
Zhang, Xuan .
JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 110
[6]   Camdar-adv: Generating adversarial patches on 3D object [J].
Chen, Chang ;
Huang, Teng .
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2021, 36 (03) :1441-1453
[7]   ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector [J].
Chen, Shang-Tse ;
Cornelius, Cory ;
Martin, Jason ;
Chau, Duen Horng .
MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES, ECML PKDD 2018, PT I, 2019, 11051 :52-68
[8]   Boundary augment: A data augment method to defend poison attack [J].
Chen, Xuan ;
Ma, YueNa ;
Lu, ShiWei ;
Yao, Yu .
IET IMAGE PROCESSING, 2021, 15 (13) :3292-3303
[9]   Guardauto: A Decentralized Runtime Protection System for Autonomous Driving [J].
Cheng, Kun ;
Zhou, Yuan ;
Chen, Bihuan ;
Wang, Rui ;
Bai, Yuebin ;
Liu, Yang .
IEEE TRANSACTIONS ON COMPUTERS, 2021, 70 (10) :1569-1581
[10]   Attacks on Self-Driving Cars and Their Countermeasures: A Survey [J].
Chowdhury, Abdullahi ;
Karmakar, Gour ;
Kamruzzaman, Joarder ;
Jolfaei, Alireza ;
Das, Rajkumar .
IEEE ACCESS, 2020, 8 :207308-207342