• 제목/요약/키워드: attack model

검색결과 989건 처리시간 0.025초

카메라-라이다 융합 모델의 오류 유발을 위한 스케일링 공격 방법 (Scaling Attack Method for Misalignment Error of Camera-LiDAR Calibration Model)

  • 임이지;최대선
    • 정보보호학회논문지
    • /
    • 제33권6호
    • /
    • pp.1099-1110
    • /
    • 2023
  • 자율주행 및 robot navigation의 인식 시스템은 성능 향상을 위해 다중 센서를 융합(Multi-Sensor Fusion)을 한 후, 객체 인식 및 추적, 차선 감지 등의 비전 작업을 한다. 현재 카메라와 라이다 센서의 융합을 기반으로 한 딥러닝 모델에 대한 연구가 활발히 이루어지고 있다. 그러나 딥러닝 모델은 입력 데이터의 변조를 통한 적대적 공격에 취약하다. 기존의 다중 센서 기반 자율주행 인식 시스템에 대한 공격은 객체 인식 모델의 신뢰 점수를 낮춰 장애물 오검출을 유도하는 데에 초점이 맞춰져 있다. 그러나 타겟 모델에만 공격이 가능하다는 한계가 있다. 센서 융합단계에 대한 공격의 경우 융합 이후의 비전 작업에 대한 오류를 연쇄적으로 유발할 수 있으며, 이러한 위험성에 대한 고려가 필요하다. 또한 시각적으로 판단하기 어려운 라이다의 포인트 클라우드 데이터에 대한 공격을 진행하여 공격 여부를 판단하기 어렵도록 한다. 본 연구에서는 이미지 스케일링 기반 카메라-라이다 융합 모델(camera-LiDAR calibration model)인 LCCNet 의 정확도를 저하시키는 공격 방법을 제안한다. 제안 방법은 입력 라이다의 포인트에 스케일링 공격을 하고자 한다. 스케일링 알고리즘과 크기별 공격 성능 실험을 진행한 결과 평균 77% 이상의 융합 오류를 유발하였다.

아핀좌표를 사용하는 페어링 연산의 Miller 알고리듬에 대한 효과적인 오류주입공격 (Efficient Fault Injection Attack to the Miller Algorithm in the Pairing Computation using Affine Coordinate System)

  • 배기석;박제훈;손교용;하재철;문상재
    • 정보보호학회논문지
    • /
    • 제21권3호
    • /
    • pp.11-25
    • /
    • 2011
  • ID 기반 암호시스템의 구현을 위한 Weil, Tate, Ate와 같은 페어링 연산 기법에서는 밀러 알고리듬이 사용된다. 본 연구에서는 밀려 알고리듬에 대한 오류 공격의 하나인 Mrabet의 방법을 분석하여 타원곡선을 표현하는 가장 기본적인 좌표계인 아핀좌표계에서의 효과적인 오류주입공격 방법을 제안하였다. 제안하는 오류주입공격은 멀리 알고리듬의 루프 횟수를 판별하는 분기 구문에 오류를 주입하는 모델이며, 실제 레이저 주입 실험을 수행하여 검증하였다. 이 모델은 기존의 루프 횟수 오류 기법에서 요구하였던 확률적인 분석을 생략할 수 있어 효과적이다.

Power-based Side-Channel Analysis Against AES Implementations: Evaluation and Comparison

  • Benhadjyoussef, Noura;Karmani, Mouna;Machhout, Mohsen
    • International Journal of Computer Science & Network Security
    • /
    • 제21권4호
    • /
    • pp.264-271
    • /
    • 2021
  • From an information security perspective, protecting sensitive data requires utilizing algorithms which resist theoretical attacks. However, treating an algorithm in a purely mathematical fashion or in other words abstracting away from its physical (hardware or software) implementation opens the door to various real-world security threats. In the modern age of electronics, cryptanalysis attempts to reveal secret information based on cryptosystem physical properties, rather than exploiting the theoretical weaknesses in the implemented cryptographic algorithm. The correlation power attack (CPA) is a Side-Channel Analysis attack used to reveal sensitive information based on the power leakages of a device. In this paper, we present a power Hacking technique to demonstrate how a power analysis can be exploited to reveal the secret information in AES crypto-core. In the proposed case study, we explain the main techniques that can break the security of the considered crypto-core by using CPA attack. Using two cryptographic devices, FPGA and 8051 microcontrollers, the experimental attack procedure shows that the AES hardware implementation has better resistance against power attack compared to the software one. On the other hand, we remark that the efficiency of CPA attack depends statistically on the implementation and the power model used for the power prediction.

NACA 0021 익형 유동장의 수치해석적 연구 (A Numerical Study on the Flowfield around a NACA 0021 Airfoil at Angles of Attack)

  • 김상덕
    • 한국항공운항학회지
    • /
    • 제24권4호
    • /
    • pp.20-25
    • /
    • 2016
  • A primary benefit of flight at high angle-of-attack conditions is to be able to reduce the speed of flight and maneuvers, which can enhance the capability of sensing and obstacle avoidance for a small UAV. The flight at high angle-of-attack conditions, however, is easy to be beyond stall which is characterized by substantial flow separation over an airfoil. Current numerical analysis was conducted on the capabilities of three representative turbulence models to predict the aerodynamic characteristics of a typical airfoil at angle-of-attack conditions. The investigation shows that these turbulence models provide good comparison with experimental data for attached flow at moderate angle-of-attack conditions. Calculation by current turbulence models are, however, not appropriate at high angle-of-attack conditions with flow separation.

원형 캐비테이터의 받음각에 따른 환기초공동 형상 예측 연구 (The prediction of ventilated supercavitation shapes according to the angle of attack of a circular cavitator)

  • 이종주;김민재;백부근;김경천
    • 한국가시화정보학회지
    • /
    • 제19권3호
    • /
    • pp.22-30
    • /
    • 2021
  • Ventilated cavity shapes by varying angle of attack of a circular cavitator were predicted based on Logvinovich's Independence Principle in order to verify the cavity shape prediction method. The prediction results were compared with model experiments conducted in the high-speed cavitation tunnel. In the prediction of the cavity centerline, the movement of the cavity centerline due to the effect of gravity and cavitator's angle of attack were well predicted. In the prediction of the cavity contour, it was found that the cavity edge prediction error increased as the angle of attack increased. The error of the upper cavity contour was small at the positive angle of attack, and the error of the lower cavity contour was small at the negative angle of attack.

축류 회전차 익말단 틈새유동에 대한 수치해석(II) - 틈새변화 및 영각변화에 따른 누설와류의 변화 - (Numerical Analysis on the Blade Tip Clearance Flow in the Axial Rotor (II) - Variation of Leakage Vortex with Tip Clearance and Attack Angle -)

  • 노수혁;조강래
    • 대한기계학회논문집B
    • /
    • 제23권9호
    • /
    • pp.1106-1112
    • /
    • 1999
  • Substantial losses behind axial flow rotor are generated by the wake, various vortices in the hub region and the tip leakage vortex in the tip region. Particularly, the leakage vortex formed near blade tip is one of the main causes of the reduction of performance, generation of noise and aerodynamic vibration in downstream. In this study, the three-dimensional flow fields in an axial flow rotor were calculated with varying tip clearance under various flow rates, and the numerical results were compared with experimental ones. The numerical technique was based on SIMPLE algorithm using standard $k-{\varepsilon}$ model(WFM) and Launder & Sharma's Low Reynolds Number $k-{\varepsilon}$ model(LRN). Through calculations, the effects of tip clearance and attack angle on the 3-dimensional flow fileds behind a rotor and leakage flow/vortex were investigated. The presence of tip leakage vortex, loci of vortex center and its behavior behind the rotor for various tip clearances and attack angles was described well by calculation.

블랙 박스 모델의 출력값을 이용한 AI 모델 종류 추론 공격 (Model Type Inference Attack Using Output of Black-Box AI Model)

  • 안윤수;최대선
    • 정보보호학회논문지
    • /
    • 제32권5호
    • /
    • pp.817-826
    • /
    • 2022
  • AI 기술이 여러 분야에 성공적으로 도입되는 추세이며, 서비스로 환경에 배포된 모델들은 지적 재산권과 데이터를 보호하기 위해 모델의 정보를 노출시키지 않는 블랙 박스 상태로 배포된다. 블랙 박스 환경에서 공격자들은 모델 출력을 이용해 학습에 쓰인 데이터나 파라미터를 훔치려고 한다. 본 논문은 딥러닝 모델을 대상으로 모델 종류에 대한 정보를 추론하는 공격이 없다는 점에서 착안하여, 모델의 구성 레이어 정보를 직접 알아내기 위해 모델의 종류를 추론하는 공격 방법을 제안한다. MNIST 데이터셋으로 학습된 ResNet, VGGNet, AlexNet과 간단한 컨볼루션 신경망 모델까지 네 가지 모델의 그레이 박스 및 블랙 박스 환경에서의 출력값을 이용해 모델의 종류가 추론될 수 있다는 것을 보였다. 또한 본 논문이 제안하는 방식인 대소 관계 피쳐를 딥러닝 모델에 함께 학습시킨 경우 블랙 박스 환경에서 약 83%의 정확도로 모델의 종류를 추론했으며, 그 결과를 통해 공격자에게 확률 벡터가 아닌 제한된 정보만 제공되는 상황에서도 모델 종류가 추론될 수 있음을 보였다.

고온 고속유동으로 인한 실제 기체효과의 수치해석적 연구 (A Numerical Study on Real Gas Effect due to High Temperature and Speed Flow)

  • 송동주
    • 대한기계학회논문집
    • /
    • 제18권9호
    • /
    • pp.2431-2442
    • /
    • 1994
  • In this paper the efficient space marching Viscous Shock Layer and Parabolized Navier-Stokes method have been applied to study the complex 3-D hypersonic equilibrium chemically reacting flowfilelds over sphere-cone($10^{\circ}$) vehicle at low angles of attack($0^{\circ}~5^{\circ}), Mach 20, and an altitude of 35km. The current bluntbody/afterbody space marching numerical method predicts the complex flowfields accurately and efficiently even on a small computer. The shock thickness from equilibrium air model is thinner than that from the perfect gas model. The windside wall heat-transfer rate, pressure and skin friction force were increased significantly when compared with those of leeside. The CA, CN, CM were increased almost linearly with the angle of attack in this region. The wall pressure, heat transfer, skin friction and axial force coeffient from equilibrium model were much higher than those from perfect gas model. The center of pressure moved forward with the increase of angle of attack.

Vulnerable Path Attack and its Detection

  • She, Chuyu;Wen, Wushao;Ye, Quanqi;Zheng, Kesong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권4호
    • /
    • pp.2149-2170
    • /
    • 2017
  • Application-layer Distributed Denial-of-Service (DDoS) attack is one of the leading security problems in the Internet. In recent years, the attack strategies of application-layer DDoS have rapidly developed. This paper introduces a new attack strategy named Path Vulnerabilities-Based (PVB) attack. In this attack strategy, an attacker first analyzes the contents of web pages and subsequently measures the actual response time of each webpage to build a web-resource-weighted-directed graph. The attacker uses a Top M Longest Path algorithm to find M DDoS vulnerable paths that consume considerable resources when sequentially accessing the pages following any of those paths. A detection mechanism for such attack is also proposed and discussed. A finite-state machine is used to model the dynamical processes for the state of the user's session and monitor the PVB attacks. Numerical results based on real-traffic simulations reveal the efficiency of the attack strategy and the detection mechanism.

Evaluation of Dynamic Characteristics for a Submerged Body with Large Angle of Attack Motion via CFD Analysis

  • Jeon, Myungjun;Mai, Thi Loan;Yoon, Hyeon Kyu;Ryu, Jaekwan;Lee, Wonhee;Ku, Pyungmo
    • 한국해양공학회지
    • /
    • 제35권5호
    • /
    • pp.313-326
    • /
    • 2021
  • A submerged body with varied control inputs can execute large drift angles and large angles of attack, as well as basic control such as straight movement and turning. The objective of this study is to analyze the dynamic characteristics of a submerged body comprising six thrusters and six control planes, which is capable of a large drift angle and angle of attack motion. Virtual captive model tests via were analyzed via computational fluid dynamics (CFD) to determine the dynamic characteristics of the submerged body. A test matrix of virtual captive model tests specialized for large-angle motion was established. Based on this test matrix, virtual captive model tests were performed with a drift angle and angle of attack of approximately 30° and 90°, respectively. The characteristics of the hydrodynamic force acting on the horizontal and vertical surfaces of the submerged body were analyzed under the large-angle motion condition, and a model representing this hydrodynamic force was established. In addition, maneuvering simulation was performed to evaluate the standard maneuverability and dynamic characteristics of large-angle motion. Considering the shape characteristics of the submerged body, we attempt to verify the feasibility of the analysis results by analyzing the characteristics of the hydrodynamic force when the large-angle motion occurred.