Automated Lane Centering (ALC) systems are convenient and widely deployed today, but also highly security and safety critical. In this work, we are the first to systematically study the security of state-of-the-art deep learning based ALC systems in their designed operational domains under physical-world adversarial attacks. We formulate the problem with a safety-critical attack goal, and a novel and domain-specific attack vector: dirty road patches. To systematically generate the attack, we adopt an optimization-based approach and overcome domain-specific design challenges such as camera frame inter-dependencies due to attack-influenced vehicle control, and the lack of objective function design for lane detection models. We evaluate our attack on a production ALC using 80 scenarios from real-world driving traces. The results show that our attack is highly effective with over 97.5% success rates and less than 0.903 sec average success time, which is substantially lower than the average driver reaction time. This attack is also found (1) robust to various real-world factors such as lighting conditions and view angles, (2) general to different model designs, and (3) stealthy from the driver's view. To understand the safety impacts, we conduct experiments using software-in-the-loop simulation and attack trace injection in a real vehicle. The results show that our attack can cause a 100% collision rate in different scenarios, including when tested with common safety features such as automatic emergency braking. We also evaluate and discuss defenses.
翻译:自动通道中心(ALC)系统是方便的,而且今天广泛部署,但也非常安全和安全。在这项工作中,我们首先系统地研究在物理世界对立式攻击下设计的行动领域最先进的深学习的ALC系统的安全性。我们以安全临界攻击目标和新颖和具体领域攻击矢量来制定问题:肮脏的道路补丁。为了系统地制造攻击,我们采取了以优化为基础的方法,克服了特定领域的设计挑战,例如由于受到攻击影响的车辆控制以及缺乏对车道探测模型的客观功能设计而导致的摄像框架相互依存性。我们利用来自现实世界驱动轨迹的80个假象来评估我们对生产ALC系统的攻击。结果显示,我们的攻击非常有效,其成功率超过97.5%,平均成功时间不到0.903秒,大大低于平均驾驶员反应时间。我们发现,这种攻击(1) 对各种真实世界因素,如照明条件和观察角度,(2)我们一般的模型设计,(3)从司机的紧急定位的角度,用真实的频率来评估对ALCA进行偷听。我们用100号对安全率进行模拟的实验,在模拟攻击中进行这种试验时,我们进行这种试验。