Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures

被引:0
|
作者
Sun, Jiachen [1 ]
Cao, Yulong [1 ]
Chen, Qi Alfred [2 ]
Mao, Z. Morley [1 ]
机构
[1] Univ Michigan, Ann Arbor, MI 48109 USA
[2] UC Irvine, Irvine, CA USA
关键词
ARCHITECTURE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Perception plays a pivotal role in autonomous driving systems, which utilizes onboard sensors like cameras and LiDARs (Light Detection and Ranging) to assess surroundings. Recent studies have demonstrated that LiDAR-based perception is vulnerable to spoofing attacks, in which adversaries spoof a fake vehicle in front of a victim self-driving car by strategically transmitting laser signals to the victim's LiDAR sensor. However, existing attacks suffer from effectiveness and generality limitations. In this work, we perform the first study to explore the general vulnerability of current LiDAR-based perception architectures and discover that the ignored occlusion patterns in LiDAR point clouds make self-driving cars vulnerable to spoofing attacks. We construct the first black-box spoofing attack based on our identified vulnerability, which universally achieves around 80% mean success rates on all target models. We perform the first defense study, proposing CARLO to mitigate LiDAR spoofing attacks. CARLO detects spoofed data by treating ignored occlusion patterns as invariant physical features, which reduces the mean attack success rate to 5.5%. Meanwhile, we take the first step towards exploring a general architecture for robust LiDAR-based perception, and propose SVF that embeds the neglected physical features into end-to-end learning. SVF further reduces the mean attack success rate to around 2.3%.
引用
收藏
页码:877 / 894
页数:18
相关论文
共 50 条
  • [31] LiDAR-Based Sensor Fusion SLAM and Localization for Autonomous Driving Vehicles in Complex Scenarios
    Dai, Kai
    Sun, Bohua
    Wu, Guanpu
    Zhao, Shuai
    Ma, Fangwu
    Zhang, Yufei
    Wu, Jian
    [J]. JOURNAL OF IMAGING, 2023, 9 (02)
  • [32] Reinforcement Learning Based Sparse Black-box Adversarial Attack on Video Recognition Models
    Wang, Zeyuan
    Sha, Chaofeng
    Yang, Su
    [J]. PROCEEDINGS OF THE THIRTIETH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, IJCAI 2021, 2021, : 3162 - 3168
  • [33] A CMA-ES-Based Adversarial Attack Against Black-Box Object Detectors
    Lyu Haoran
    Tan Yu'an
    Xue Yuan
    Wang Yajie
    Xue Jingfeng
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (03) : 406 - 412
  • [34] A CMA-ES-Based Adversarial Attack Against Black-Box Object Detectors
    LYU Haoran
    TAN Yu'an
    XUE Yuan
    WANG Yajie
    XUE Jingfeng
    [J]. Chinese Journal of Electronics, 2021, 30 (03) : 406 - 412
  • [35] SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning
    Guan, Yuting
    He, Junjiang
    Li, Tao
    Zhao, Hui
    Ma, Baoqiang
    [J]. FUTURE INTERNET, 2023, 15 (04):
  • [36] Black-Box Adversarial Attack on Graph Neural Networks Based on Node Domain Knowledge
    Sun, Qin
    Yang, Zheng
    Liu, Zhiming
    Zou, Quan
    [J]. KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, PT I, KSEM 2023, 2023, 14117 : 203 - 217
  • [37] Coreset Learning-Based Sparse Black-Box Adversarial Attack for Video Recognition
    Chen, Jiefu
    Chen, Tong
    Xu, Xing
    Zhang, Jingran
    Yang, Yang
    Shen, Heng Tao
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 1547 - 1560
  • [38] A CMA-ES-Based Adversarial Attack on Black-Box Deep Neural Networks
    Kuang, Xiaohui
    Liu, Hongyi
    Wang, Ye
    Zhang, Qikun
    Zhang, Quanxin
    Zheng, Jun
    [J]. IEEE ACCESS, 2019, 7 : 172938 - 172947
  • [39] Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information
    Li, Heng
    Cheng, Zhang
    Wu, Bang
    Yuan, Liheng
    Gao, Cuiying
    Yuan, Wei
    Luo, Xiapu
    [J]. PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 1181 - 1198
  • [40] An efficient general black-box adversarial attack approach based on multi-objective optimization for high dimensional images
    Zhang, Chunkai
    Guo, Xin
    Deng, Yepeng
    Wang, Xuan
    Han, Peiyi
    Liu, Chuanyi
    Zhang, Hanyu
    [J]. Computers and Electrical Engineering, 2021, 95