ML-driven Malware that Targets AV Safety

04/24/2020
by   Saurabh Jha, et al.
0

Ensuring the safety of autonomous vehicles (AVs) is critical for their mass deployment and public adoption. However, security attacks that violate safety constraints and cause accidents are a significant deterrent to achieving public trust in AVs, and that hinders a vendor's ability to deploy AVs. Creating a security hazard that results in a severe safety compromise (for example, an accident) is compelling from an attacker's perspective. In this paper, we introduce an attack model, a method to deploy the attack in the form of smart malware, and an experimental evaluation of its impact on production-grade autonomous driving software. We find that determining the time interval during which to launch the attack is critically important for causing safety hazards (such as collisions) with a high degree of success. For example, the smart malware caused 33X more forced emergency braking than random attacks did, and accidents in 52.6

READ FULL TEXT

page 2

page 5

page 8

research
08/06/2021

Evaluating Adversarial Attacks on Driving Safety in Vision-Based Autonomous Vehicles

In recent years, many deep learning models have been adopted in autonomo...
research
01/20/2020

A Secure and Smart Framework for Preventing Ransomware Attack

Nowadays security is major concern for any user connected to the interne...
research
05/24/2020

SoK: Arms Race in Adversarial Malware Detection

Malicious software (malware) is a major cyber threat that shall be tackl...
research
07/18/2023

Experimental Security Analysis of DNN-based Adaptive Cruise Control under Context-Aware Perception Attacks

Adaptive Cruise Control (ACC) is a widely used driver assistance feature...
research
09/06/2023

Disarming Steganography Attacks Inside Neural Network Models

Similar to the revolution of open source code sharing, Artificial Intell...
research
08/31/2021

EthClipper: A Clipboard Meddling Attack on Hardware Wallets with Address Verification Evasion

Hardware wallets are designed to withstand malware attacks by isolating ...
research
01/20/2020

On the Feasibility of Acoustic Attacks Using Commodity Smart Devices

Sound at frequencies above (ultrasonic) or below (infrasonic) the range ...

Please sign up or login with your details

Forgot password? Click here to reset