DARTS: Deceiving Autonomous Cars with Toxic Signs
نویسندگان
چکیده
Sign recognition is an integral part of autonomous cars. Any misclassication of trac signs can potentially lead to a multitude of disastrous consequences, ranging from a life-threatening accident to even a large-scale interruption of transportation services relying on autonomous cars. In this paper, we propose and examine realistic security aacks against sign recognition systems for Deceiving Autonomous caRs with Toxic Signs (we call the proposed aacks DARTS). Leveraging the concept of adversarial examples, we strategically modify innocuous signs/advertisements in the environment in such a way that they seem normal to human observers but are interpreted as the adversary’s desired trac sign by autonomous cars. Further, we pursue a fundamentally dierent perspective to aacking autonomous cars, motivated by the observation that the driver and vehicle-mounted camera see the environment from dierent angles (the camera commonly sees the road with a higher angle, e.g., from top of the car). Bridging concepts from optics (in particular, lenticular printing), security, and computer vision, we propose a novel aack against vehicular sign recognition systems: we create signs that change as they are viewed from dierent angles, and thus, can be interpreted dierently by the driver and sign recognition. We extensively evaluate the proposed aacks under various conditions: dierent distances, lighting conditions, and camera angles. We rst examine our aacks virtually, i.e., we check if the digital images of toxic signs can deceive the sign recognition system. Further, we investigate the eectiveness of aacks in real-world seings: we print toxic signs, install them in the environment, capture videos using a vehicle-mounted camera, and process them using our sign recognition pipeline. We nd our aacks to achieve aack success rates of over 90% in both the digital and real-world seings. We further suggest a countermeasure based on adversarial training to protect against adversarial example-based aacks. Our proof-of-concept aacks shed light on a fundamental security challenge associated with the use of sign recognition techniques in autonomous cars, paving the way for further investigation of overlooked security challenges of autonomous cars.
منابع مشابه
Rogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos
We propose a new real-world attack against the computer vision based systems of autonomous vehicles (AVs). Our novel Sign Embedding attack exploits the concept of adversarial examples to modify innocuous signs and advertisements in the environment such that they are classified as the adversary’s desired traffic sign with high confidence. Our attack greatly expands the scope of the threat posed ...
متن کاملIssn 2348-375x Advanced Driver Assistance Systems for Automobiles Using Wpan
Road sign detection is important to a robotic vehicle that drives on roads automatically. In this paper, road signs are detected by means of rules that restrict and require signs to appear only in limited regions using wireless. They are then recognized using a PAN ID matching method. The method is fast and can easily be modified to include new classes of signs. As with any vehicle, an autonomo...
متن کاملRoad Lane Detection Robust to Shadows Based on a Fuzzy System Using a Visible Light Camera Sensor
Recently, autonomous vehicles, particularly self-driving cars, have received significant attention owing to rapid advancements in sensor and computation technologies. In addition to traffic sign recognition, road lane detection is one of the most important factors used in lane departure warning systems and autonomous vehicles for maintaining the safety of semi-autonomous and fully autonomous sy...
متن کاملA Philosophy for Developing Trust in Self‐ Driving Cars
For decades, our lives have depended on the safe operation of automated mechanisms around and inside us. The autonomy and complexity of these mechanisms is increasing dramatically. Autonomous systems such as self-driving cars rely heavily on inductive inference and complex software, both of which confound traditional software-safety techniques that are focused on amassing sufficient confirmator...
متن کاملTutorial Proposal Title: Developing Cyber-Physical Systems: Autonomous Vehicles in Regular Traffic
“Cyber-physical systems (CPS) are engineered systems that are built from and depend upon the synergy of computational and physical components. Emerging CPS will be coordinated, distributed, and connected, and must be robust and responsive.” (From NSF – USA). In this tutorial we will cover aspects of the analysis and synthesis of CPS, concentrating on the design of Autonomous Vehicles. We shall ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1802.06430 شماره
صفحات -
تاریخ انتشار 2018