Filters








23 Hits in 12.8 sec

Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World [article]

Hua Ma, Yinshan Li, Yansong Gao, Alsharif Abuadbba, Zhi Zhang, Anmin Fu, Hyoungshick Kim, Said F. Al-Sarawi, Nepal Surya, Derek Abbott
2022 arXiv   pre-print
We use a natural T-shirt bought from a market as a trigger to enable the cloaking effect--the person bounding-box disappears in front of the object detector.  ...  However, there is no investigation and understanding of the backdoor vulnerability of the object detector, even in the digital world with digital triggers.  ...  In addition, beyond attack the object detector, previous backdoor attacks usually uses digital triggers rather than natural physical triggers.  ... 
arXiv:2201.08619v2 fatcat:qwkxbexxd5hmlacw4w4d272aiu

MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World [article]

Hua Ma, Yinshan Li, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Anmin Fu, Said F. Al-Sarawi, Nepal Surya, Derek Abbott
2022 arXiv   pre-print
We observe that the backdoor effect of both misclassification and the cloaking are robustly achieved in the wild when the backdoor is activated with inconspicuously natural physical triggers.  ...  We propose MACAB that crafts clean-annotated images to stealthily implant the backdoor into the object detectors trained on them even when the data curator can manually audit the images.  ...  of the robust backdoor attack on the object detection in a physical world.  ... 
arXiv:2209.02339v1 fatcat:kiteag424bhdfmtuolyjjvkw2e

Physical Adversarial Attack meets Computer Vision: A Decade Survey [article]

Hui Wei, Hao Tang, Xuemei Jia, Hanxun Yu, Zhubo Li, Zhixiang Wang, Shin'ichi Satoh, Zheng Wang
2022 arXiv   pre-print
We first clarify the concept of the physical adversarial attack and analyze its characteristics. Then, we define the adversarial medium, essential to perform attacks in the physical world.  ...  In this paper, we focus on physical adversarial attacks and provide a comprehensive survey of over 150 existing papers.  ...  It is worth mentioning that backdoor attacks can also perform attacks in the physical world [88] , i.e., recently, Qi et al.  ... 
arXiv:2209.15179v1 fatcat:2jfwvj36g5gdxedndft3izrbse

A Survey on Recent Advanced Research of CPS Security

Zhenhua Wang, Wei Xie, Baosheng Wang, Jing Tao, Enze Wang
2021 Applied Sciences  
Cyber-physical systems (CPSs) are next-generation intelligent systems that integrate computing, communication, and control. Malicious attacks on CPSs can lead to both property damage and casualties.  ...  In this paper, we provide an overview of the CPS security studies from the last five years and select 142 related works from A- or B-level conferences/journals recommended by the China Computer Federation  ...  The authors evaluates PIE on four real-world devices, and it extracted all commands from their protocol parsers, including hidden commands (backdoor).  ... 
doi:10.3390/app11093751 fatcat:fxby2wjzpnchrfshvilxalmptm

SoK: Anti-Facial Recognition Technology [article]

Emily Wenger, Shawn Shan, Haitao Zheng, Ben Y. Zhao
2021 arXiv   pre-print
The set of AFR tools proposed in the last few years is wide-ranging and rapidly evolving, necessitating a step back to consider the broader design space of AFR systems and long-term challenges.  ...  The rapid adoption of facial recognition (FR) technology by both government and commercial entities in recent years has raised concerns about civil liberties and privacy.  ...  Goldstein, “Making an invisibility perturbations to evade FR models, either in the preprocessing cloak: Real world adversarial attacks on object detectors,” in Proc. of 2 or classification  ... 
arXiv:2112.04558v1 fatcat:quvw5jffcrfvnh62274axis3ti

Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection

Luca Caviglione, Michal Choras, Igino Corona, Artur Janicki, Wojciech Mazurczyk, Marek Pawlicki, Katarzyna Wasielewska
2020 IEEE Access  
On this basis, we review the evolution of modern threats in the communication networks, with a particular focus on the techniques employing information hiding.  ...  Next, we present the bird's eye view portraying the main development trends in detection methods with a special emphasis on the machine learning techniques.  ...  Such attacks trigger the search for defensive methods, which results in a vicious circle. The arms race continues. FIGURE 1 . 1 FIGURE 1.  ... 
doi:10.1109/access.2020.3048319 fatcat:tatdk6pzczgp3aylvbxoxabuta

Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research [article]

Zhibo Zhang, Hussam Al Hamadi, Ernesto Damiani, Chan Yeob Yeun, Fatma Taher
2022 arXiv   pre-print
However, although Artificial Intelligence-based approaches for the detection and defense of cyber attacks and threats are more advanced and efficient compared to the conventional signature-based and rule-based  ...  The deficiencies of transparency and interpretability of existing Artificial Intelligence techniques would decrease human users' confidence in the models utilized for the defense against cyber attacks,  ...  This three-stage based architecture can increase user trust while filtering out all cloaked dangerous network data by introducing transparency to the decision-making process.  ... 
arXiv:2208.14937v1 fatcat:qyqk2oxsbvhapjszbkwuz3aw5q

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1994 Software engineering notes  
20 01) SH Irish gang physically takes out telephone exchange (R 20 01) fS JavaScript flaw in Netscape allows reading of other caches (R 20 02) Sf Cult of the Dead Cow Windows 95/98 BackOrifice Backdoor  ...  Whereas the emphasis in the following list is on problems rather than on would-be solutions, the pervasive nature of the problems suggests that techniques for the effective development and operation of  ...  result is broken (R 19 57) -Beware of bogus diploma mills on the Net (R 19 52) h Univ.  ... 
doi:10.1145/181610.181612 fatcat:qfzxpio6tfgl5nmbevta334afi

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1992 Software engineering notes  
20 01) SH Irish gang physically takes out telephone exchange (R 20 01) fS JavaScript flaw in Netscape allows reading of other caches (R 20 02) Sf Cult of the Dead Cow Windows 95/98 BackOrifice Backdoor  ...  Whereas the emphasis in the following list is on problems rather than on would-be solutions, the pervasive nature of the problems suggests that techniques for the effective development and operation of  ...  result is broken (R 19 57) -Beware of bogus diploma mills on the Net (R 19 52) h Univ.  ... 
doi:10.1145/134292.134293 fatcat:ayrwcbvvljhrdeav5kvrxaycs4

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1996 Software engineering notes  
20 01) SH Irish gang physically takes out telephone exchange (R 20 01) fS JavaScript flaw in Netscape allows reading of other caches (R 20 02) Sf Cult of the Dead Cow Windows 95/98 BackOrifice Backdoor  ...  Whereas the emphasis in the following list is on problems rather than on would-be solutions, the pervasive nature of the problems suggests that techniques for the effective development and operation of  ...  result is broken (R 19 57) -Beware of bogus diploma mills on the Net (R 19 52) h Univ.  ... 
doi:10.1145/381790.381797 fatcat:kcxte3luzrg57ms3gwwbqzs5ji

Pizzagate, Pedogate - inside Podesta's emails [article]

Victor Christianto
2020 Figshare  
This is an insightful discussion on pedogate links of certain secrecy emails, Podesta emails etc.New book release (2020).  ...  Researchers fear that someone will be physically attacked, and the blame will be placed on them under the guise of the "fake news" meme.  ...  led to the Twitter account, and the trigger videos hidden in code on that Twitter that feature corresponding colors, characters, and objects, all have led to online speculation we are witnessing some  ... 
doi:10.6084/m9.figshare.12423758 fatcat:6uvipoushjbfdpzcioynxuewre

Child Abuse Reporting Laws and Attorney-Client Confidences: The Reality and the Specter of Lawyer as Informant

Robert P. Mosteller
1992 Duke law journal  
Child abuse is a societal problem of tragic proportions in America.  ...  On a yearly basis, over two million reports of child abuse and neglect are made to state child protective service agencies,' over one million children suffer demonstrable harm as a  ...  an emergency basis was that the lawyer should alert security personnel to the danger of the attack without the need to disclose even the identity of the client.  ... 
doi:10.2307/1372803 fatcat:e5himgfvafganhagbe2efupodq

Proceedings of the Seminars Future Internet (FI) and Innovative Internet Technologies and Mobile Communication (IITM), Summer Semester 2017 [article]

Georg Carle, Daniel Raumer, Lukas Schwaighofer, Chair Of Network Architectures
2017
Acknowledgement This work was partly performed at IsarNet Software Solutions GmbH and funded as part of the AutoMon project by the German Federal Ministry of Education and Research (BMBF) with contract  ...  The more time passes, the higher the risk that either the malicious program itself or the attackers backdoor access for triggering it will be found.  ...  One option to implement spatial cloaking is with a quadtree-based algorithm [6] .  ... 
doi:10.2313/net-2017-09-1 fatcat:qtxz2tweurbszpmvspmsek3bsq

On the evolution of digital evidence: novel approaches for cyber investigation [article]

Giancarlo De Maio, Universita' Degli Studi Di Salerno, Universita' Degli Studi Di Salerno
2014
Nowadays Internet is the fulcrum of our world, and the World Wide Web is the key to access it. We develop relationships on social networks and entrust sensitive documents to online services.  ...  Aiming at raising awareness for upcoming threats, novel techniques for the obfuscation of web-based attacks are presented.  ...  to the triggering of the attack.  ... 
doi:10.14273/unisa-288 fatcat:jjzctfpwrra6zpaonbw3bkeyke

Privacy & the new panopticon: lawful access and the race between law and technology in the war on terror

Owen J Kirkaldy
2008
NOTICE: The author has granted a nonexclusive license allowing Library and Archives Canada to reproduce, publish, archive, preserve, conserve, communicate to the public by telecommunication or on the Internet  ...  , loan, distribute and sell theses worldwide, for commercial or noncommercial purposes, in microform, paper, electronic and/or any other formats.  ...  the Sept. 11,2001, attacks has led in some instances to detention based on thin or speculative evidence.  ... 
doi:10.7939/r3-dre0-nx46 fatcat:szwjj373gre5zldy56tvienhcq
« Previous Showing results 1 — 15 out of 23 results