Overload: Latency Attacks on Object Detection for Edge Devices

Read original: arXiv:2304.05370 - Published 4/29/2024 by Erh-Chung Chen, Pin-Yu Chen, I-Hsin Chung, Che-rung Lee
Total Score

0

🔎

Sign in to get full access

or

If you already have an account, we'll log you in

Overview

  • This paper investigates a type of attack on deep learning-based applications called "latency attacks."
  • Unlike common adversarial attacks that aim to cause misclassification, latency attacks focus on increasing the inference time of the model, which can prevent applications from responding to requests within a reasonable timeframe.
  • The authors demonstrate this type of attack using object detection as an example and present a framework called "Overload" to generate latency attacks at scale.
  • The proposed attack escalates the required computing costs during inference, leading to significantly longer inference times, which is a serious threat to systems with limited computing resources.

Plain English Explanation

The paper looks at a new type of attack on deep learning applications called "latency attacks." Latency attacks are different from typical adversarial attacks, which try to trick the model into making mistakes. Instead, latency attacks aim to slow down the model's response time, potentially causing the application to fail to respond within an acceptable timeframe.

The researchers use object detection as an example to demonstrate how these latency attacks work. They've developed a framework called "Overload" that can generate these types of attacks at a large scale. The key idea is to make the model require a lot more computing power during the inference (or "prediction") process, which then drastically increases the time it takes for the model to make a decision.

This type of attack could be especially problematic for applications running on devices with limited computing resources, like IoT devices. Even if the model is still able to make the right predictions, the delays caused by the latency attack could prevent the application from functioning properly.

Technical Explanation

The authors formulate a new optimization problem and introduce a novel technique called "spatial attention" to generate latency attacks against deep learning-based object detection models. These attacks are designed to escalate the required computing costs during inference, leading to significantly longer inference times.

The researchers conducted experiments using the YOLOv5 object detection model running on an Nvidia Jetson NX platform. Compared to existing methods, their approach is simpler yet more effective at increasing inference latency. The results show that their latency attacks can increase the inference time for a single image by up to 10x compared to the normal, unattacked setting.

Importantly, the authors note that their attacks are "NMS-agnostic," meaning they are effective even against object detection models that use non-maximum suppression (NMS) techniques. This suggests the attacks could pose a threat to a wide range of object detection applications.

Critical Analysis

The paper presents a novel and concerning type of attack on deep learning systems. While the authors demonstrate the attacks using object detection as an example, the implications extend to any deep learning-based application that has strict latency requirements, such as real-time network intrusion detection or video analysis systems.

One potential limitation is that the experiments were conducted on a specific hardware platform (Nvidia Jetson NX). It would be valuable to see how the attacks perform on a wider range of devices, especially those with more limited computing resources.

Additionally, the paper does not provide detailed information on potential defenses against these latency attacks. Exploring effective countermeasures should be an important area for future research in this domain.

Conclusion

This paper introduces a new type of attack on deep learning applications called "latency attacks." Unlike typical adversarial attacks that aim to cause misclassification, latency attacks focus on increasing the inference time of the model, which can prevent applications from responding to requests within a reasonable timeframe.

The authors present a framework called "Overload" to generate these latency attacks at scale, demonstrating their effectiveness on object detection models. The attacks escalate the required computing costs during inference, leading to significantly longer response times, which is a serious threat to systems with limited computing resources.

The implications of this research extend beyond object detection to any deep learning-based application with strict latency requirements. Investigating effective defenses against these attacks should be a priority for the research community to ensure the reliable deployment of deep learning systems in mission-critical applications.



This summary was produced with help from an AI and may contain inaccuracies - check out the links to read the original source documents!

Follow @aimodelsfyi on 𝕏 →

Related Papers

🔎

Total Score

0

Overload: Latency Attacks on Object Detection for Edge Devices

Erh-Chung Chen, Pin-Yu Chen, I-Hsin Chung, Che-rung Lee

Nowadays, the deployment of deep learning-based applications is an essential task owing to the increasing demands on intelligent services. In this paper, we investigate latency attacks on deep learning applications. Unlike common adversarial attacks for misclassification, the goal of latency attacks is to increase the inference time, which may stop applications from responding to the requests within a reasonable time. This kind of attack is ubiquitous for various applications, and we use object detection to demonstrate how such kind of attacks work. We also design a framework named Overload to generate latency attacks at scale. Our method is based on a newly formulated optimization problem and a novel technique, called spatial attention. This attack serves to escalate the required computing costs during the inference time, consequently leading to an extended inference time for object detection. It presents a significant threat, especially to systems with limited computing resources. We conducted experiments using YOLOv5 models on Nvidia NX. Compared to existing methods, our method is simpler and more effective. The experimental results show that with latency attacks, the inference time of a single image can be increased ten times longer in reference to the normal setting. Moreover, our findings pose a potential new threat to all object detection tasks requiring non-maximum suppression (NMS), as our attack is NMS-agnostic.

Read more

4/29/2024

🔎

Total Score

0

Mask-based Invisible Backdoor Attacks on Object Detection

Jeongjin Shin

Deep learning models have achieved unprecedented performance in the domain of object detection, resulting in breakthroughs in areas such as autonomous driving and security. However, deep learning models are vulnerable to backdoor attacks. These attacks prompt models to behave similarly to standard models without a trigger; however, they act maliciously upon detecting a predefined trigger. Despite extensive research on backdoor attacks in image classification, their application to object detection remains relatively underexplored. Given the widespread application of object detection in critical real-world scenarios, the sensitivity and potential impact of these vulnerabilities cannot be overstated. In this study, we propose an effective invisible backdoor attack on object detection utilizing a mask-based approach. Three distinct attack scenarios were explored for object detection: object disappearance, object misclassification, and object generation attack. Through extensive experiments, we comprehensively examined the effectiveness of these attacks and tested certain defense methods to determine effective countermeasures. Code will be available at https://github.com/jeongjin0/invisible-backdoor-object-detection

Read more

6/5/2024

🔎

Total Score

0

A Survey and Evaluation of Adversarial Attacks for Object Detection

Khoi Nguyen Tiet Nguyen, Wenyu Zhang, Kangkang Lu, Yuhuan Wu, Xingjian Zheng, Hui Li Tan, Liangli Zhen

Deep learning models excel in various computer vision tasks but are susceptible to adversarial examples-subtle perturbations in input data that lead to incorrect predictions. This vulnerability poses significant risks in safety-critical applications such as autonomous vehicles, security surveillance, and aircraft health monitoring. While numerous surveys focus on adversarial attacks in image classification, the literature on such attacks in object detection is limited. This paper offers a comprehensive taxonomy of adversarial attacks specific to object detection, reviews existing adversarial robustness evaluation metrics, and systematically assesses open-source attack methods and model robustness. Key observations are provided to enhance the understanding of attack effectiveness and corresponding countermeasures. Additionally, we identify crucial research challenges to guide future efforts in securing automated object detection systems.

Read more

8/7/2024

🔎

Total Score

0

A Human-in-the-Middle Attack against Object Detection Systems

Han Wu, Sareh Rowlands, Johan Wahlstrom

Object detection systems using deep learning models have become increasingly popular in robotics thanks to the rising power of CPUs and GPUs in embedded systems. However, these models are susceptible to adversarial attacks. While some attacks are limited by strict assumptions on access to the detection system, we propose a novel hardware attack inspired by Man-in-the-Middle attacks in cryptography. This attack generates a Universal Adversarial Perturbations (UAP) and injects the perturbation between the USB camera and the detection system via a hardware attack. Besides, prior research is misled by an evaluation metric that measures the model accuracy rather than the attack performance. In combination with our proposed evaluation metrics, we significantly increased the strength of adversarial perturbations. These findings raise serious concerns for applications of deep learning models in safety-critical systems, such as autonomous driving.

Read more

7/12/2024