NDSS 2025 – Revisiting Physical-World Adversarial Attack On Traffic Sign Recognition
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。用户已经提供了文章的详细内容,包括会议信息、作者、摘要以及一些背景信息。 首先,我要确定文章的主题。看起来是关于自动驾驶汽车的物理世界对抗攻击,特别是针对交通标志识别系统的研究。摘要中提到他们测试了现有的攻击方法对商业系统的有效性,并发现了一些新的观察结果。 接下来,我需要提取关键点:研究对象是商业TSR系统,测试结果显示攻击成功率有高有低,原因可能与空间记忆设计有关,并提出了新的评估指标。 然后,我需要用简洁的语言把这些点整合起来,确保在100字以内。要注意避免使用复杂的术语,让总结清晰易懂。 最后,检查一下是否涵盖了主要发现和研究的意义,确保没有遗漏重要信息。 </think> 本文研究了物理世界对抗攻击对商业交通标志识别系统的影响,发现现有攻击方法对某些系统有100%成功率,但整体效果有限。研究揭示了空间记忆设计可能是影响攻击效果的关键因素,并提出了新的评估指标。 2026-3-5 16:0:0 Author: securityboulevard.com(查看原文) 阅读量:6 收藏

Session 14D: Autonomous Vehicles

Authors, Creators & Presenters: Ningfei Wang (University of California, Irvine), Shaoyuan Xie (University of California, Irvine), Takami Sato (University of California, Irvine), Yunpeng Luo (University of California, Irvine), Kaidi Xu (Drexel University), Qi Alfred Chen (University of California, Irvine)
PAPER
Revisiting Physical-World Adversarial Attack On Traffic Sign Recognition: A Commercial Systems Perspective
Traffic Sign Recognition (TSR) is crucial for safe and correct driving automation. Recent works revealed a general vulnerability of TSR models to physical-world adversarial attacks, which can be low-cost, highly deployable, and capable of causing severe attack effects such as hiding a critical traffic sign or spoofing a fake one. However, so far existing works generally only considered evaluating the attack effects on academic TSR models, leaving the impacts of such attacks on real-world commercial TSR systems largely unclear. In this paper, we conduct the first large-scale measurement of physical-world adversarial attacks against commercial TSR systems. Our testing results reveal that it is possible for existing attack works from academia to have highly reliable (100%) attack success against certain commercial TSR system functionality, but such attack capabilities are not generalizable, leading to much lower-than-expected attack success rates overall. We find that one potential major factor is a spatial memorization design that commonly exists in today’s commercial TSR systems. We design new attack success metrics that can mathematically model the impacts of such design on the TSR system-level attack success, and use them to revisit existing attacks. Through these efforts, we uncover 7 novel observations, some of which directly challenge the observations or claims in prior works due to the introduction of the new metrics.
ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.

Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations’ YouTube Channel.

Permalink

*** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at: https://www.youtube-nocookie.com/embed/56cTQTy1tJU?si=0OKf8H1ge0disLox


文章来源: https://securityboulevard.com/2026/03/ndss-2025-revisiting-physical-world-adversarial-attack-on-traffic-sign-recognition/
如有侵权请联系:admin#unsafe.sh