• Title/Summary/Keyword: Attack Model

Search Result 991, Processing Time 0.026 seconds

Scaling Attack Method for Misalignment Error of Camera-LiDAR Calibration Model (카메라-라이다 융합 모델의 오류 유발을 위한 스케일링 공격 방법)

  • Yi-ji Im;Dae-seon Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1099-1110
    • /
    • 2023
  • The recognition system of autonomous driving and robot navigation performs vision work such as object recognition, tracking, and lane detection after multi-sensor fusion to improve performance. Currently, research on a deep learning model based on the fusion of a camera and a lidar sensor is being actively conducted. However, deep learning models are vulnerable to adversarial attacks through modulation of input data. Attacks on the existing multi-sensor-based autonomous driving recognition system are focused on inducing obstacle detection by lowering the confidence score of the object recognition model.However, there is a limitation that an attack is possible only in the target model. In the case of attacks on the sensor fusion stage, errors in vision work after fusion can be cascaded, and this risk needs to be considered. In addition, an attack on LIDAR's point cloud data, which is difficult to judge visually, makes it difficult to determine whether it is an attack. In this study, image scaling-based camera-lidar We propose an attack method that reduces the accuracy of LCCNet, a fusion model (camera-LiDAR calibration model). The proposed method is to perform a scaling attack on the point of the input lidar. As a result of conducting an attack performance experiment by size with a scaling algorithm, an average of more than 77% of fusion errors were caused.

Efficient Fault Injection Attack to the Miller Algorithm in the Pairing Computation using Affine Coordinate System (아핀좌표를 사용하는 페어링 연산의 Miller 알고리듬에 대한 효과적인 오류주입공격)

  • Bae, Ki-Seok;Park, Jea-Hoon;Sohn, Gyo-Yong;Ha, Jae-Cheol;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.11-25
    • /
    • 2011
  • The Miller algorithm is employed in the typical pairing computation such as Weil, Tate and Ate for implementing ID based cryptosystem. By analyzing the Mrabet's attack that is one of fault attacks against the Miller algorithm, this paper presents au efficient fault attack in Affine coordinate system, it is the most basic coordinates for construction of elliptic curve. The proposed attack is the effective model of a count check fault attack, it is verified to work well by practical fault injection experiments and can omit the probabilistic analysis that is required in the previous counter fault model.

Power-based Side-Channel Analysis Against AES Implementations: Evaluation and Comparison

  • Benhadjyoussef, Noura;Karmani, Mouna;Machhout, Mohsen
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.264-271
    • /
    • 2021
  • From an information security perspective, protecting sensitive data requires utilizing algorithms which resist theoretical attacks. However, treating an algorithm in a purely mathematical fashion or in other words abstracting away from its physical (hardware or software) implementation opens the door to various real-world security threats. In the modern age of electronics, cryptanalysis attempts to reveal secret information based on cryptosystem physical properties, rather than exploiting the theoretical weaknesses in the implemented cryptographic algorithm. The correlation power attack (CPA) is a Side-Channel Analysis attack used to reveal sensitive information based on the power leakages of a device. In this paper, we present a power Hacking technique to demonstrate how a power analysis can be exploited to reveal the secret information in AES crypto-core. In the proposed case study, we explain the main techniques that can break the security of the considered crypto-core by using CPA attack. Using two cryptographic devices, FPGA and 8051 microcontrollers, the experimental attack procedure shows that the AES hardware implementation has better resistance against power attack compared to the software one. On the other hand, we remark that the efficiency of CPA attack depends statistically on the implementation and the power model used for the power prediction.

A Numerical Study on the Flowfield around a NACA 0021 Airfoil at Angles of Attack (NACA 0021 익형 유동장의 수치해석적 연구)

  • Kim, Sang-Dug
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.24 no.4
    • /
    • pp.20-25
    • /
    • 2016
  • A primary benefit of flight at high angle-of-attack conditions is to be able to reduce the speed of flight and maneuvers, which can enhance the capability of sensing and obstacle avoidance for a small UAV. The flight at high angle-of-attack conditions, however, is easy to be beyond stall which is characterized by substantial flow separation over an airfoil. Current numerical analysis was conducted on the capabilities of three representative turbulence models to predict the aerodynamic characteristics of a typical airfoil at angle-of-attack conditions. The investigation shows that these turbulence models provide good comparison with experimental data for attached flow at moderate angle-of-attack conditions. Calculation by current turbulence models are, however, not appropriate at high angle-of-attack conditions with flow separation.

The prediction of ventilated supercavitation shapes according to the angle of attack of a circular cavitator (원형 캐비테이터의 받음각에 따른 환기초공동 형상 예측 연구)

  • Yi, Jong-Ju;Kim, Min-Jae;Paik, Bu-Geun;Kim, Kyung Chun
    • Journal of the Korean Society of Visualization
    • /
    • v.19 no.3
    • /
    • pp.22-30
    • /
    • 2021
  • Ventilated cavity shapes by varying angle of attack of a circular cavitator were predicted based on Logvinovich's Independence Principle in order to verify the cavity shape prediction method. The prediction results were compared with model experiments conducted in the high-speed cavitation tunnel. In the prediction of the cavity centerline, the movement of the cavity centerline due to the effect of gravity and cavitator's angle of attack were well predicted. In the prediction of the cavity contour, it was found that the cavity edge prediction error increased as the angle of attack increased. The error of the upper cavity contour was small at the positive angle of attack, and the error of the lower cavity contour was small at the negative angle of attack.

Numerical Analysis on the Blade Tip Clearance Flow in the Axial Rotor (II) - Variation of Leakage Vortex with Tip Clearance and Attack Angle - (축류 회전차 익말단 틈새유동에 대한 수치해석(II) - 틈새변화 및 영각변화에 따른 누설와류의 변화 -)

  • Ro, Soo-Hyuk;Cho, Kang-Rae
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.23 no.9
    • /
    • pp.1106-1112
    • /
    • 1999
  • Substantial losses behind axial flow rotor are generated by the wake, various vortices in the hub region and the tip leakage vortex in the tip region. Particularly, the leakage vortex formed near blade tip is one of the main causes of the reduction of performance, generation of noise and aerodynamic vibration in downstream. In this study, the three-dimensional flow fields in an axial flow rotor were calculated with varying tip clearance under various flow rates, and the numerical results were compared with experimental ones. The numerical technique was based on SIMPLE algorithm using standard $k-{\varepsilon}$ model(WFM) and Launder & Sharma's Low Reynolds Number $k-{\varepsilon}$ model(LRN). Through calculations, the effects of tip clearance and attack angle on the 3-dimensional flow fileds behind a rotor and leakage flow/vortex were investigated. The presence of tip leakage vortex, loci of vortex center and its behavior behind the rotor for various tip clearances and attack angles was described well by calculation.

Model Type Inference Attack Using Output of Black-Box AI Model (블랙 박스 모델의 출력값을 이용한 AI 모델 종류 추론 공격)

  • An, Yoonsoo;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.817-826
    • /
    • 2022
  • AI technology is being successfully introduced in many fields, and models deployed as a service are deployed with black box environment that does not expose the model's information to protect intellectual property rights and data. In a black box environment, attackers try to steal data or parameters used during training by using model output. This paper proposes a method of inferring the type of model to directly find out the composition of layer of the target model, based on the fact that there is no attack to infer the information about the type of model from the deep learning model. With ResNet, VGGNet, AlexNet, and simple convolutional neural network models trained with MNIST datasets, we show that the types of models can be inferred using the output values in the gray box and black box environments of the each model. In addition, we inferred the type of model with approximately 83% accuracy in the black box environment if we train the big and small relationship feature that proposed in this paper together, the results show that the model type can be infrerred even in situations where only partial information is given to attackers, not raw probability vectors.

A Numerical Study on Real Gas Effect due to High Temperature and Speed Flow (고온 고속유동으로 인한 실제 기체효과의 수치해석적 연구)

  • 송동주
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.18 no.9
    • /
    • pp.2431-2442
    • /
    • 1994
  • In this paper the efficient space marching Viscous Shock Layer and Parabolized Navier-Stokes method have been applied to study the complex 3-D hypersonic equilibrium chemically reacting flowfilelds over sphere-cone($10^{\circ}$) vehicle at low angles of attack($0^{\circ}~5^{\circ}), Mach 20, and an altitude of 35km. The current bluntbody/afterbody space marching numerical method predicts the complex flowfields accurately and efficiently even on a small computer. The shock thickness from equilibrium air model is thinner than that from the perfect gas model. The windside wall heat-transfer rate, pressure and skin friction force were increased significantly when compared with those of leeside. The CA, CN, CM were increased almost linearly with the angle of attack in this region. The wall pressure, heat transfer, skin friction and axial force coeffient from equilibrium model were much higher than those from perfect gas model. The center of pressure moved forward with the increase of angle of attack.

Vulnerable Path Attack and its Detection

  • She, Chuyu;Wen, Wushao;Ye, Quanqi;Zheng, Kesong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2149-2170
    • /
    • 2017
  • Application-layer Distributed Denial-of-Service (DDoS) attack is one of the leading security problems in the Internet. In recent years, the attack strategies of application-layer DDoS have rapidly developed. This paper introduces a new attack strategy named Path Vulnerabilities-Based (PVB) attack. In this attack strategy, an attacker first analyzes the contents of web pages and subsequently measures the actual response time of each webpage to build a web-resource-weighted-directed graph. The attacker uses a Top M Longest Path algorithm to find M DDoS vulnerable paths that consume considerable resources when sequentially accessing the pages following any of those paths. A detection mechanism for such attack is also proposed and discussed. A finite-state machine is used to model the dynamical processes for the state of the user's session and monitor the PVB attacks. Numerical results based on real-traffic simulations reveal the efficiency of the attack strategy and the detection mechanism.

Evaluation of Dynamic Characteristics for a Submerged Body with Large Angle of Attack Motion via CFD Analysis

  • Jeon, Myungjun;Mai, Thi Loan;Yoon, Hyeon Kyu;Ryu, Jaekwan;Lee, Wonhee;Ku, Pyungmo
    • Journal of Ocean Engineering and Technology
    • /
    • v.35 no.5
    • /
    • pp.313-326
    • /
    • 2021
  • A submerged body with varied control inputs can execute large drift angles and large angles of attack, as well as basic control such as straight movement and turning. The objective of this study is to analyze the dynamic characteristics of a submerged body comprising six thrusters and six control planes, which is capable of a large drift angle and angle of attack motion. Virtual captive model tests via were analyzed via computational fluid dynamics (CFD) to determine the dynamic characteristics of the submerged body. A test matrix of virtual captive model tests specialized for large-angle motion was established. Based on this test matrix, virtual captive model tests were performed with a drift angle and angle of attack of approximately 30° and 90°, respectively. The characteristics of the hydrodynamic force acting on the horizontal and vertical surfaces of the submerged body were analyzed under the large-angle motion condition, and a model representing this hydrodynamic force was established. In addition, maneuvering simulation was performed to evaluate the standard maneuverability and dynamic characteristics of large-angle motion. Considering the shape characteristics of the submerged body, we attempt to verify the feasibility of the analysis results by analyzing the characteristics of the hydrodynamic force when the large-angle motion occurred.