Priest: Adversarial Attack Detection Techniques for Signal Injection Attacks

نویسندگان

چکیده

Machine learning is widely used for autonomous driving because it can recognize surrounding circumstances feasibly from sensor and determine appropriate actions. Most of these sensors are based on micro-electro-mechanical systems (MEMS), which enable vehicles to judge objects in conjunction with object-detection algorithms. However, recent studies have shown that MEMS vulnerable signal-injection attacks, the input images manipulated force object detection algorithms misclassify results. These attacks be critical wild they deteriorate state-of-the-art techniques, dropping their rates until would no longer detected at all. In this paper, we propose Priest, a novel method against prior attacks. Priest uses similarity pixel values between two consecutive images. Using only ensures low computational cost. According our performance analysis, detects real-time 99% accuracy average, achieving practical security.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms - A Tutorial

Fault Injection Attacks are a powerful form of active attack mechanism which can threaten even the strongest of cryptographic algorithms. This attack vector has become more pertinent with the growing popularity of the Internet of things (IoT), which is based on small omnipresent embedded systems interacting with sensitive data of personal or critical nature. This tutorial addresses this issue o...

متن کامل

Detection Block Model for SQL Injection Attacks

With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in...

متن کامل

Minimizing Databases Attack Surface Against SQL Injection Attacks

Lately, end-users and database administrators face continuously personal data exposures. Among different type of vulnerabilities an adversary might exploit, to gain access to this data, SQL injections are considered one of the most serious vulnerabilities, which remain at the top twenty most known vulnerabilities more than a decade. Though various defenses have been proposed against SQL injecti...

متن کامل

Survey and Comparative Analysis of SQL Injection Attacks, Detection and Prevention Techniques for Web Applications Security

Web applications witnessed a rapid growth for online business and transactions are expected to be secure, efficient and reliable to the users against any form of injection attacks. SQL injection is one of the most common application layer attack techniques used today by hackers to steal data from organizations. It is a technique that exploits a security vulnerability occurring in the database l...

متن کامل

Profile Injection Attack Detection in Recommender System

.................................................................................. iii TABLE OF CONTENTS................................................................... iv LIST OF FIGURES......................................................................... vii LIST OF TABLES........................................................................... viii

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2023

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2023.3307133