Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles

被引:0
|
作者
Hallyburton, R. Spencer [1 ]
Liu, Yupei [1 ]
Cao, Yulong [2 ]
Mao, Z. Morley [2 ]
Pajic, Miroslav [1 ]
机构
[1] Duke Univ, Durham, NC 27706 USA
[2] Univ Michigan, Ann Arbor, MI 48109 USA
来源
PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM | 2022年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To enable safe and reliable decision-making, autonomous vehicles (AVs) feed sensor data to perception algorithms to understand the environment. Sensor fusion with multi-frame tracking is becoming increasingly popular for detecting 3D objects. Thus, in this work, we perform an analysis of camera-LiDAR fusion, in the AV context, under LiDAR spoofing attacks. Recently, LiDAR-only perception was shown vulnerable to LiDAR spoofing attacks; however, we demonstrate these attacks are not capable of disrupting camera-LiDAR fusion. We then define a novel, context-aware attack: frustum attack, and show that out of 8 widely used perception algorithms - across 3 architectures of LiDAR-only and 3 architectures of camera-LiDAR fusion - all are significantly vulnerable to the frustum attack. In addition, we demonstrate that the frustum attack is stealthy to existing defenses against LiDAR spoofing as it preserves consistencies between camera and LiDAR semantics. Finally, we show that the frustum attack can be exercised consistently over time to form stealthy longitudinal attack sequences, compromising the tracking module and creating adverse outcomes on end-to-end AV control.
引用
收藏
页码:1903 / 1920
页数:18
相关论文
共 50 条
  • [1] Camera-LiDAR Data Fusion for Autonomous Mooring Operation
    Subedi, Dipendra
    Jha, Ajit
    Tyapin, Ilya
    Hovland, Geir
    PROCEEDINGS OF THE 15TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA 2020), 2020, : 1176 - 1181
  • [2] Black-box Adversarial Attacks in Autonomous Vehicle Technology
    Kumar, K. Naveen
    Vishnu, C.
    Mitra, Reshmi
    Mohan, C. Krishna
    2020 IEEE APPLIED IMAGERY PATTERN RECOGNITION WORKSHOP (AIPR): TRUSTED COMPUTING, PRIVACY, AND SECURING MULTIMEDIA, 2020,
  • [3] Object detection using depth completion and camera-LiDAR fusion for autonomous driving
    Carranza-Garcia, Manuel
    Javier Galan-Sales, F.
    Maria Luna-Romera, Jose
    Riquelme, Jose C.
    INTEGRATED COMPUTER-AIDED ENGINEERING, 2022, 29 (03) : 241 - 258
  • [4] Impossibility of Black-Box Simulation Against Leakage Attacks
    Ostrovsky, Rafail
    Persiano, Giuseppe
    Visconti, Ivan
    ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 : 130 - 149
  • [5] Practical Black-Box Attacks against Machine Learning
    Papernot, Nicolas
    McDaniel, Patrick
    Goodfellow, Ian
    Jha, Somesh
    Celik, Z. Berkay
    Swami, Ananthram
    PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 506 - 519
  • [6] Boundary Defense Against Black-box Adversarial Attacks
    Aithal, Manjushree B.
    Li, Xiaohua
    2022 26TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2022, : 2349 - 2356
  • [7] Joint Multi-Object Detection and Tracking with Camera-LiDAR Fusion for Autonomous Driving
    Huang, Kemiao
    Hao, Qi
    2021 IEEE/RSJ INTERNATIONAL CONFERENCE ON INTELLIGENT ROBOTS AND SYSTEMS (IROS), 2021, : 6983 - 6989
  • [8] Camera-LiDAR Cross-Modality Fusion Water Segmentation for Unmanned Surface Vehicles
    Gao, Jiantao
    Zhang, Jingting
    Liu, Chang
    Li, Xiaomao
    Peng, Yan
    JOURNAL OF MARINE SCIENCE AND ENGINEERING, 2022, 10 (06)
  • [9] Encrypted-Input Program Obfuscation: Simultaneous Security Against White-Box and Black-Box Attacks
    Di Crescenzo, Giovanni
    Bahler, Lisa
    McIntosh, Allen
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [10] Black-Box Attacks against Signed Graph Analysis via Balance Poisoning
    Zhou, Jialong
    Lai, Yuni
    Ren, Jian
    Zhou, Kai
    2024 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC, 2024, : 530 - 535