skip to main content
10.1145/3508352.3561097acmconferencesArticle/Chapter ViewAbstractPublication PagesiccadConference Proceedingsconference-collections
invited-talk

Attacks on Image Sensors

Published: 22 December 2022 Publication History

Abstract

This paper provides a taxonomy of security vulnerabilities of smart image sensor systems. Image sensors form an important class of sensors. Many image sensors include computation units that can provide traditional algorithms such as image or video compression along with machine learning tasks such as classification. Some attacks rely on the physics and optics of imaging. Other attacks take advantage of the complex logic and software required to perform imaging systems.

References

[1]
2007. HDL-64E User's Manual. Technical Report. t63-HDL-64E.
[2]
2015. TMS320DM816x DaVinci(TM) Digital Media Processor. Technical Report. SPRS614F.
[3]
2017. CCD290-66 Back Illuminated Scientific Sensor 6144 × 6160 Pixels, Eight Outputs, Non-Inverted Mode Operation. Technical Report. A1A-790120 Version 1.
[4]
2017. Data Communication Programmer's Guide for the Peregrine 3D Flash LiDAR Camera. Technical Report.
[5]
2018. FLIR LEPTON Engineering Datasheet. Technical Report. https://cdn.sparkfun.com/assets/f/6/3/4/c/Lepton_Engineering_Datasheet_Rev200.pdf
[6]
2021. Bird XGA. Technical Report. https://scdusa-ir.com/wp-content/uploads/2021/11/Bird-XGA.pdf
[7]
Tao Bai, Jinqi Luo, and Jun Zhao. 2021. Inconspicuous adversarial patches for fooling image recognition systems on mobile devices. IEEE Internet of Things Journal (2021).
[8]
Bryce E. Bayer. 1976. Color Imaging Array. Technical Report. U. S. Patent US3971065A.
[9]
W. S. Boyle and G. E. Smith. 1970. Charge Coupled Semiconductor Devices. Bell System Technical Journal 49, 4 (April 1970), 587--593.
[10]
Yulong Cao, Chaowei Xiao, Benjamin Cyr, Yimeng Zhou, Won Park, Sara Rampazzi, Qi Alfred Chen, Kevin Fu, and Z Morley Mao. 2019. Adversarial sensor attack on lidar-based perception in autonomous driving. In Proceedings of the 2019 ACM SIGSAC conference on computer and communications security. 2267--2281.
[11]
Nicholas Carlini and David Wagner. 2017. Adversarial examples are not easily detected: Bypassing ten detection methods. In Proceedings of the 10th ACM workshop on artificial intelligence and security. 3--14.
[12]
Antonia Creswell, Tom White, Vincent Dumoulin, Kai Arulkumaran, Biswa Sengupta, and Anil A Bharath. 2018. Generative adversarial networks: An overview. IEEE signal processing magazine 35, 1 (2018), 53--65.
[13]
Ivan Evtimov, Kevin Eykholt, Earlence Fernandes, Tadayoshi Kohno, Bo Li, Atul Prakash, Amir Rahmati, and Dawn Song. 2017. Robust physical-world attacks on machine learning models. arXiv preprint arXiv:1707.08945 2, 3 (2017), 4.
[14]
Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Chaowei Xiao, Atul Prakash, Tadayoshi Kohno, and Dawn Song. 2018. Robust physical-world attacks on deep learning visual classification. In Proceedings of the IEEE conference on computer vision and pattern recognition. 1625--1634.
[15]
Eric R. Fossum. 1993. Active pixel sensors - are CCD's dinosaurs. In Proc. SPIE.
[16]
Andrei Frumusanu. 2021. The Apple A15 SoC Performance Review: Faster and More Efficient. Anandtech (4 October 2021). https://www.anandtech.com/show/16983/the-apple-a15-soc-performance-review-faster-more-efficient.
[17]
Taehoon Jeong, Anantha P. Chandrakasan, and Hae-Seung Lee. 2021. S2ADC: A 12--bit, 1.25-MS/s Secure SAR ADC With Power Side-Channel Attack Resistance. IEEE Journal of Solid-State Circuits 56, 3 (2021), 844--854.
[18]
Motaz Khader and Samir Cherian. 2020. An Introduction to Automotive LIDAR. Technical Report. SLYY150A.
[19]
Yoongu Kim, Ross Daly, Jeremie Kim, Chris Fallin, Ji Hye Lee, Donghyuk Lee, Chris Wilkerson, Konrad Lai, and Onur Mutlu. 2014. Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors. In 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA). 361--372.
[20]
Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, and Stefan Savage. 2010. Experimental Security Analysis of a Modern Automobile. In 2010 IEEE Symposium on Security and Privacy. 447--462.
[21]
Denis Foo Kune, John Backes, Shane S. Clark, Daniel Kramer, Matthew Reynolds, Kevin Fu, Yongdae Kim, and Wenyuan Xu. 2013. Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors. In 2013 IEEE Symposium on Security and Privacy. 145--159.
[22]
Alexey Kurakin, Ian J Goodfellow, and Samy Bengio. 2018. Adversarial examples in the physical world. In Artificial intelligence safety and security. Chapman and Hall/CRC, 99--112.
[23]
Yang Li, Kazuo Sakiyama, Shigeto Gomisawa, Toshinori Fukunaga, Junko Takahashi, and Kazuo Ohta. 2010. Fault sensitivity analysis. In International workshop on cryptographic hardware and embedded systems. Springer, 320--334.
[24]
Dina G. Mahmoud, Vincent Lenders, and Mirjana Stojilović. 2022. Electrical-Level Attacks on CPUs, FPGAs, and GPUs: Survey and Implications in the Heterogeneous Era. ACM Comput. Surv. 55, 3, Article 58 (feb 2022), 40 pages.
[25]
Richard B. Merrill, Richard F. Lyon, Richard M. Turner, Robert S. Hannebauer, and Russel A. Martin. 2005. Vertical color filter sensor group with non-sensor filter and method for fabricating such a sensor group. Technical Report. U. S. Patent US6841816B2.
[26]
Make ML. 2020. Road Signs Dataset. https://www.makeml.app/datasets/road-signs
[27]
Nir Morgulis, Alexander Kreines, Shachar Mendelowitz, and Yuval Weisglass. 2019. Fooling a real car with adversarial traffic signs. arXiv preprint arXiv:1907.00374 (2019).
[28]
On Semiconductor 2019. AR0130 1/3-inch CMOS Digital Image Sensor. On Semiconductor. AR0130CS/D, revision 15.
[29]
Tatsuya Oyama, Shunsuke Okura, Kota Yoshida, and Takeshi Fujino. 2021. Backdoor Attack on Deep Neural Networks Triggered by Fault Injection Attack on Image Sensor Interface. In Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security. 63--72.
[30]
Nicolas Papernot, Patrick McDaniel, and Ian Goodfellow. 2016. Transferability in machine learning: from phenomena to black-box attacks using adversarial samples. arXiv preprint arXiv:1605.07277 (2016).
[31]
Carlo H. Squin and Michael F. Thompsett. 1975. Charge-Transfer Devices. Academic Press.
[32]
Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, and Michael K Reiter. 2019. A general framework for adversarial examples with objectives. ACM Transactions on Privacy and Security (TOPS) 22, 3 (2019), 1--30.
[33]
Hocheol Shin, Dohyun Kim, Yujin Kwon, and Yongdae Kim. 2017. Illusion and dazzle: Adversarial optical channel exploits against lidars for automotive applications. In International Conference on Cryptographic Hardware and Embedded Systems. Springer, 445--467.
[34]
Sergei Skorobogatov. 2011. Fault attacks on secure chips. Design and Security of Cryptographic Algorithms and Devices (2011).
[35]
ST Microelectronics 2018. VG6440, VD6440 Automotive 1.3 Megapixel high-dynamic range image sensor. ST Microelectronics. DocID023597, Rev 11.
[36]
Pawel Swierczynski, Georg T. Becker, Amir Moradi, and Christof Paar. 2018. Bitstream Fault Injections (BiFI)-Automated Fault Attacks Against SRAM-Based FPGAs. IEEE Trans. Comput. 67, 3 (2018), 348--360.
[37]
S. M. Sze. 1975. Physics of Semiconductor Devices (second ed.). John Wiley and Sons.
[38]
Marilyn Wolf. 2016. Computers as Components Principles of Embedded Computing System Design (fourth ed.). Elsevier.
[39]
Marilyn Wolf. 2018. Smart Camera Design: Algorithms, Architectures, and Art. Springer.
[40]
Kexiong Curtis Zeng, Yuanchao Shu, Shinan Liu, Yanzhi Dou, and Yaling Yang. 2017. A Practical GPS Location Spoofing Attack in Road Navigation Scenario. In Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications (Sonoma, CA, USA) (HotMobile '17). Association for Computing Machinery, New York, NY, USA, 85--90.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICCAD '22: Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design
October 2022
1467 pages
ISBN:9781450392174
DOI:10.1145/3508352
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

In-Cooperation

  • IEEE-EDS: Electronic Devices Society
  • IEEE CAS
  • IEEE CEDA

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 December 2022

Check for updates

Author Tags

  1. hardware security
  2. image sensor
  3. smart image sensor

Qualifiers

  • Invited-talk

Conference

ICCAD '22
Sponsor:
ICCAD '22: IEEE/ACM International Conference on Computer-Aided Design
October 30 - November 3, 2022
California, San Diego

Acceptance Rates

Overall Acceptance Rate 457 of 1,762 submissions, 26%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 135
    Total Downloads
  • Downloads (Last 12 months)37
  • Downloads (Last 6 weeks)6
Reflects downloads up to 28 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media