Discovery of AI/ML Supply Chain Vulnerabilities within Automotive Cyber-Physical Systems

被引:3
作者
Williams, Daniel [1 ]
Clark, Chelece [1 ]
McGahan, Rachel [1 ]
Potteiger, Bradley [1 ]
Cohen, Daniel [1 ]
Musau, Patrick [2 ]
机构
[1] Johns Hopkins Appl Phys Lab, Laurel, MD 20723 USA
[2] Vanderbilt Univ, Dept Elect & Comp Engn, Nashville, TN USA
来源
2022 IEEE INTERNATIONAL CONFERENCE ON ASSURED AUTONOMY (ICAA 2022) | 2022年
关键词
Cyber-Physical Systems; Artificial Intelligence; Machine Learning; Autonomous Vulnerability Discovery; Supply Chain; Autonomous Vehicles;
D O I
10.1109/ICAA52185.2022.00020
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Steady advancement in Artificial Intelligence (AI) development over recent years has caused AI systems to become more readily adopted across industry and military use-cases globally. As powerful as these algorithms are, there are still gaping questions regarding their security and reliability. Beyond adversarial machine learning, software supply chain vulnerabilities and model backdoor injection exploits are emerging as potential threats to the physical safety of AI reliant CPS such as autonomous vehicles. In this work in progress paper, we introduce the concept of AI supply chain vulnerabilities with a provided proof of concept autonomous exploitation framework. We investigate the viability of algorithm backdoors and software third party library dependencies for applicability into modern AI attack kill chains. We leverage an autonomous vehicle case study for demonstrating the applicability of our offensive methodologies within a realistic AI CPS operating environment.
引用
收藏
页码:93 / 96
页数:4
相关论文
共 13 条
[1]  
[Anonymous], PERCENTAGE VULNERABI
[2]  
[Anonymous], GOOGLE TENSORFLOW VU
[3]  
[Anonymous], 2011, 20 USENIX SEC S USEN
[4]  
Brundage M, 2018, Arxiv, DOI [arXiv:1802.07228, 10.48550/arXiv.1802.07228, DOI 10.48550/ARXIV.1802.07228]
[5]   Every Move You Make [J].
Charette, Robert N. .
IEEE SPECTRUM, 2009, 46 (12) :7-7
[6]  
Lee EA, 2008, ISORC 2008: 11TH IEEE SYMPOSIUM ON OBJECT/COMPONENT/SERVICE-ORIENTED REAL-TIME DISTRIBUTED COMPUTING - PROCEEDINGS, P363, DOI 10.1109/ISORC.2008.25
[7]  
Lee N., 2015, Counterterrorism and Cybersecurity, P429
[8]   Trojaning Attack on Neural Networks [J].
Liu, Yingqi ;
Ma, Shiqing ;
Aafer, Yousra ;
Lee, Wen-Chuan ;
Zhai, Juan ;
Wang, Weihang ;
Zhang, Xiangyu .
25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018), 2018,
[9]  
Miller C., 2013, DEF CON, V21, P260
[10]   A Study of Security Vulnerabilities on Docker Hub [J].
Shu, Rui ;
Gu, Xiaohui ;
Enck, William .
PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, :269-280