The search functionality is under construction.
The search functionality is under construction.

Adversarial Examples Created by Fault Injection Attack on Image Sensor Interface

Tatsuya OYAMA, Kota YOSHIDA, Shunsuke OKURA, Takeshi FUJINO

  • Full Text Views

    0

  • Cite this

Summary :

Adversarial examples (AEs), which cause misclassification by adding subtle perturbations to input images, have been proposed as an attack method on image-classification systems using deep neural networks (DNNs). Physical AEs created by attaching stickers to traffic signs have been reported, which are a threat to traffic-sign-recognition DNNs used in advanced driver assistance systems. We previously proposed an attack method for generating a noise area on images by superimposing an electrical signal on the mobile industry processor interface and showed that it can generate a single adversarial mark that triggers a backdoor attack on the input image. Therefore, we propose a misclassification attack method n DNNs by creating AEs that include small perturbations to multiple places on the image by the fault injection. The perturbation position for AEs is pre-calculated in advance against the target traffic-sign image, which will be captured on future driving. With 5.2% to 5.5% of a specific image on the simulation, the perturbation that induces misclassification to the target label was calculated. As the experimental results, we confirmed that the traffic-sign-recognition DNN on a Raspberry Pi was successfully misclassified when the target traffic sign was captured with. In addition, we created robust AEs that cause misclassification of images with varying positions and size by adding a common perturbation. We propose a method to reduce the amount of robust AEs perturbation. Our results demonstrated successful misclassification of the captured image with a high attack success rate even if the position and size of the captured image are slightly changed.

Publication
IEICE TRANSACTIONS on Fundamentals Vol.E107-A No.3 pp.344-354
Publication Date
2024/03/01
Publicized
2023/09/26
Online ISSN
1745-1337
DOI
10.1587/transfun.2023CIP0025
Type of Manuscript
Special Section PAPER (Special Section on Cryptography and Information Security)
Category

Authors

Tatsuya OYAMA
  Ritsumeikan University
Kota YOSHIDA
  Ritsumeikan University
Shunsuke OKURA
  Ritsumeikan University
Takeshi FUJINO
  Ritsumeikan University

Keyword