GSTDTAP  > 地球科学
Digital invisibility cloaks outsmart smart devices
admin
2020-10-09
发布年2020
语种英语
国家澳大利亚
领域地球科学
正文(英文)
Items in a scene surounded by boxes showing they have been identified and there are no signs of digital invisibility

A digital invisibility cloak could have criminal uses.

Many of us would pick invisibility as a potential superpower. Today’s technology has made this possible, just not in the way you might assume.

Computer vision and image analysis technology have boomed in recent years. As a result, smart devices like sensors and cameras are fast becoming the norm as we move towards an autonomously-assisted society.

Research from Data61, in partnership with South Korea’s Sungkyunkwan University and the Cyber Security Cooperative Research Centre (CSCRC), has revealed object detectors in these smart devices can be exploited with relative ease. Making it possible for people to digitally disappear and bypass detection.

The data behind digital invisibility

Machine learning detection systems analyse video footage and identify people based on a number of factors. These factors include what people are wearing. ‘Invisible cloak’ attacks work against these systems. In effect, these attacks can identify what clothes can be worn to bypass detection by these systems.

This demo video shows how easy it is to manipulate these systems. Initially you can see both subjects detected by the program. However, whenever one person wears a red beanie, they disappear and the program can not detect them.

Digital stealth with real-world impacts

Dr Sharif Abuadbba and Dr Garrison Gao are Cybersecurity Research Scientists at Data61. They currently work for CSCRC’s Security Orchestration and Automation research theme.

Dr Abuadbba said the simplicity of the demo highlights how prevalent this threat is without businesses realising.

“The threat of these potential backdoors in video detection programs go beyond the obvious security implications,” he said.

“With driverless cars on the horizon, our research shows if such a backdoor exists in the machine learning program that fuels this driving, there is a real potential for objects on the road to go intentionally undetected.”

For businesses looking to invest in their cybersecurity systems, acknowledging these backdoors may exist will help minimise blind spots. More research is needed to understand the prevalence of these backdoor threats. In the meantime, businesses can mitigate risks by avoiding the use of a single data or model set from a sole provider.

For the full version of this article head on over to our Algorithm blog.

URL查看原文
来源平台Commonwealth Scientific and Industrial Research Organisation
文献类型新闻
条目标识符http://119.78.100.173/C666/handle/2XK7JSWQ/297652
专题地球科学
推荐引用方式
GB/T 7714
admin. Digital invisibility cloaks outsmart smart devices. 2020.
条目包含的文件
条目无相关文件。
个性服务
推荐该条目
保存到收藏夹
查看访问统计
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[admin]的文章
百度学术
百度学术中相似的文章
[admin]的文章
必应学术
必应学术中相似的文章
[admin]的文章
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。