DeGhost: Unmasking Phantom Intrusions in Autonomous Recognition Systems

Hotaka Oyama*, Ryo Iijima, Tatsuya Mori

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Autonomous systems that rely on object recognition are susceptible to the unique vulnerability of phantom attacks. In these scenarios, adversaries exploit the system by projecting sophisticated deceptive illusions that cause confusion between real objects and their virtual shadows. Despite the growing consensus on the importance of this threat, previous research has lacked comprehensive and quantitative assessments. In an effort to address this research gap, we first methodically investigated the success rates of attacks at various projection distances and angles. Following this baseline assessment, we conducted targeted experiments on two different setups: a black-box approach using the commercial DJI Mavic Air drone with its ActiveTrack feature, and a white-box approach using the open-source Tello drone integrated with YOLOv3 object recognition. These real-world evaluations clearly demonstrated the effectiveness of the phantom attacks. Considering the identified vulnerabilities, we developed DeGhost, a deep learning framework capable of distinguishing real entities from their projected counterparts. To ensure a holistic understanding of its performance, we projected phantoms using different types of projectors onto various surfaces such as concrete, screens, white cloth, white walls, whiteboards, and wooden boards. DeGhost was then evaluated against a range of SoTA object detectors, including the YOLO series, Faster R-CNN, and CenterNet. Our results underscored the ability of DeGhost to detect these phantom attacks with high accuracy, as evidenced by an AUC of 0.998, an FNR of 0.013, and an FPR of 0.018. In addition, the incorporation of an advanced Fourier technique enhanced the robustness of the model. This study not only illuminates the feasibility of the attack but also offers practical security countermeasures for emerging autonomous technologies.

Original languageEnglish
Title of host publicationProceedings - 9th IEEE European Symposium on Security and Privacy, Euro S and P 2024
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages78-94
Number of pages17
ISBN (Electronic)9798350354256
DOIs
Publication statusPublished - 2024
Event9th IEEE European Symposium on Security and Privacy, Euro S and P 2024 - Vienna, Austria
Duration: 2024 Jul 82024 Jul 12

Publication series

NameProceedings - 9th IEEE European Symposium on Security and Privacy, Euro S and P 2024

Conference

Conference9th IEEE European Symposium on Security and Privacy, Euro S and P 2024
Country/TerritoryAustria
CityVienna
Period24/7/824/7/12

Keywords

  • drone
  • machine learning
  • phantom attack
  • security

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'DeGhost: Unmasking Phantom Intrusions in Autonomous Recognition Systems'. Together they form a unique fingerprint.

Cite this