Many of us would pick invisibility as a potential superpower. Today’s technology has made this possible, just not in the way you might assume.
Computer vision and image analysis technology have boomed in recent years. As a result, smart devices like sensors and cameras are fast becoming the norm as we move towards an autonomously-assisted society.
Research from Data61, in partnership with South Korea’s Sungkyunkwan University and the Cyber Security Cooperative Research Centre (CSCRC), has revealed object detectors in these smart devices can be exploited with relative ease. Making it possible for people to digitally disappear and bypass detection.
The data behind digital invisibility
Machine learning detection systems analyse video footage and identify people based on a number of factors. These factors include what people are wearing. ‘Invisible cloak’ attacks work against these systems. In effect, these attacks can identify what clothes can be worn to bypass detection by these systems.
This demo video shows how easy it is to manipulate these systems. Initially you can see both subjects detected by the program. However, whenever one person wears a red beanie, they disappear and the program can not detect them.
Digital stealth with real-world impacts
Dr Sharif Abuadbba and Dr Garrison Gao are Cybersecurity Research Scientists at Data61. They currently work for CSCRC’s Security Orchestration and Automation research theme.
Dr Abuadbba said the simplicity of the demo highlights how prevalent this threat is without businesses realising.
“The threat of these potential backdoors in video detection programs go beyond the obvious security implications,” he said.
“With driverless cars on the horizon, our research shows if such a backdoor exists in the machine learning program that fuels this driving, there is a real potential for objects on the road to go intentionally undetected.”
For businesses looking to invest in their cybersecurity systems, acknowledging these backdoors may exist will help minimise blind spots. More research is needed to understand the prevalence of these backdoor threats. In the meantime, businesses can mitigate risks by avoiding the use of a single data or model set from a sole provider.
For the full version of this article head on over to our Algorithm blog.