2023
DOI: 10.48550/arxiv.2301.03118
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Facial Misrecognition Systems: Simple Weight Manipulations Force DNNs to Err Only on Specific Persons

Abstract: In this paper we describe how to plant novel types of backdoors in any facial recognition model based on the popular architecture of deep Siamese neural networks, by mathematically changing a small fraction of its weights (i.e., without using any additional training or optimization). These backdoors force the system to err only on specific persons which are preselected by the attacker. For example, we show how such a backdoored system can take any two images of a particular person and decide that they represen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 26 publications
(47 reference statements)
0
1
0
Order By: Relevance
“…V-TD4: Vehicle Sensors Camera [104] • RBright (250 lx) and dark (0 lx) environments, with different light sources at multiple distances (50 cm, 100 cm, 150 cm, and 200 cm), presentation attack [118] • Fake environmental conditions [119,120] • Physical access-Close proximity to vehicular camera • Blinding attack [121] • Phantom attack • Practical attack • Scalability is high • Environmental light considering the light wavelength and distance between the cameras leading to incorrect model recognition [121] • Not able to tune the auto-exposure Ultrasonic [121] • Jamming attack may be accomplished by broadcasting ultrasonic noises that overwhelm the membrane on the sensor • By adjusting the timing of spoofed pulses, an attacker can manipulate the readings of sensor • Practical attack • Scalability is high • Failing to detect obstacles can lead to collisions in parking or manoeuvreing. • Incorrect data sensed can lead to collisions [121] LIDAR [104,122,123] • Having known the working knowledge of LIDAR and set of transceivers, the attacker receives the LIDAR signal and relays then to next vehicle.…”
Section: Trust Domain Entry Point Threat Description Impactmentioning
confidence: 99%
“…V-TD4: Vehicle Sensors Camera [104] • RBright (250 lx) and dark (0 lx) environments, with different light sources at multiple distances (50 cm, 100 cm, 150 cm, and 200 cm), presentation attack [118] • Fake environmental conditions [119,120] • Physical access-Close proximity to vehicular camera • Blinding attack [121] • Phantom attack • Practical attack • Scalability is high • Environmental light considering the light wavelength and distance between the cameras leading to incorrect model recognition [121] • Not able to tune the auto-exposure Ultrasonic [121] • Jamming attack may be accomplished by broadcasting ultrasonic noises that overwhelm the membrane on the sensor • By adjusting the timing of spoofed pulses, an attacker can manipulate the readings of sensor • Practical attack • Scalability is high • Failing to detect obstacles can lead to collisions in parking or manoeuvreing. • Incorrect data sensed can lead to collisions [121] LIDAR [104,122,123] • Having known the working knowledge of LIDAR and set of transceivers, the attacker receives the LIDAR signal and relays then to next vehicle.…”
Section: Trust Domain Entry Point Threat Description Impactmentioning
confidence: 99%
“…Bright (250 lx) and dark (0 lx) environments, with different light sources at multiple distances (50 cm, 100 cm, 150 cm, and 200cm), presentation attack [ 93 ]…”
Section: Table A1mentioning
confidence: 99%