¥É¥í¡¼¥ó¤Ï¡È¥×¥í¥¸¥§¥¯¥¿¡¼¤¬±Ç¤·¤¿¿Í¡É¤ò¿Í´Ö¤È´Ö°ã¤¨¤ë¡©¡¡Áá°ðÅÄÂç¤Ê¤É¤¬Ä´ºº¡¡ÂкöË¡¤âÄó°Æ

2

2024ǯ04·î15Æü 08:21  ITmedia NEWS

ITmedia NEWS

¥É¥í¡¼¥ó¤ËÅëºÜ¤ÎʪÂÎǧ¼±¥·¥¹¥Æ¥à¤¬¡¢¥×¥í¥¸¥§¥¯¥¿¡¼¤ËÅê±Æ¤µ¤ì¤¿¿Í¤Î±ÇÁü¤ò¿Íʪ¤À¤Èǧ¼±¤·¤Æ¤¤¤ëÍÍ»Ò

¡¡Áá°ðÅÄÂç³Ø¤È»º¶Èµ»½ÑÁí¹ç¸¦µæ½ê¤Ë½ê°¤¹¤ë¸¦µæ¼Ô¤é¤¬È¯É½¤·¤¿ÏÀʸ¡ÖDeGhost: Unmasking Phantom Intrusions in Autonomous Recognition Systems¡×¤Ï¡¢¥×¥í¥¸¥§¥¯¥¿¡¼¤ÇÅê±Æ¤¹¤ë¿Í¤ä¼Ö¤Ê¤É¤ÇʪÂÎǧ¼±¥·¥¹¥Æ¥à¤òµ½¤¯¤³¤È¤¬¤Ç¤­¤ë¤«¤òʬÀϤ·¡¢Âбþ¼êË¡¤òÄó°Æ¤·¤¿¸¦µæÊó¹ð¤Ç¤¢¤ë¡£


¡Ú¤½¤Î¾¤Î²èÁü¡Û


¡¡¼«Æ°±¿Å¾¼Ö¤ä¥É¥í¡¼¥ó¤Ê¤É¤Î¼«Î§¥·¥¹¥Æ¥à¤Ï¡¢ÊªÂÎǧ¼±¥·¥¹¥Æ¥à¤òÍѤ¤¤Æ¼þ°Ï¤Î´Ä¶­¤òǧ¼±¤·¡¢Å¬ÀÚ¤ÊÆ°ºî¤ò¹Ô¤Ã¤Æ¤¤¤ë¡£¤·¤«¤·¡¢¤³¤ÎʪÂÎǧ¼±µ»½Ñ¤Ë¤Ï¡Ö¸¸±Æ¹¶·â¡×¡ÊPhantom Attack¡Ë¤È¸Æ¤Ð¤ì¤ë¿·¤¿¤ÊÀȼåÀ­¤¬Â¸ºß¤¹¤ë¡£


¡¡¸¸±Æ¹¶·â¤È¤Ï¡¢¥×¥í¥¸¥§¥¯¥¿¡¼¤ò»È¤Ã¤Æ¿Í¤ä¼Ö¤Ê¤É¤ÎʪÂΤòÌϤ·¤¿±ÇÁü¤òÅê±Æ¤·¡¢¼«Î§¥·¥¹¥Æ¥à¤ÎʪÂÎǧ¼±µ¡Ç½¤Ëº®Íð¤ò°ú¤­µ¯¤³¤¹¹¶·â¼êË¡¤Ç¤¢¤ë¡£¹¶·â¼Ô¤Ï¡¢¤³¤¦¤·¤¿±ÇÁü¤ò¹ª¤ß¤ËÁàºî¤¹¤ë¤³¤È¤Ç¡¢¼ÂºÝ¤ÎʪÂΤȤ½¤Î¥×¥í¥¸¥§¥¯¥¿¡¼¤Çºî¤é¤ì¤¿¸¸±Æ¤ò¶èÊ̤Ǥ­¤Ê¤¯¤µ¤»¡¢¼«Î§¥·¥¹¥Æ¥à¤òµ½¤­¡¢°Õ¿Þ¤·¤¿Æ°ºî¤ò¹Ô¤ï¤»¤ë¤³¤È¤¬¤Ç¤­¤ë¡£


¡¡Î㤨¤Ð¡¢Êâ¹Ô¼Ô¤òǧ¼±¤·¤ÆÄä»ß¤¹¤ë¼«Æ°±¿Å¾¼Ö¤ä¡¢¥Ñ¥È¥í¡¼¥ëÍѤÎAI¥É¥í¡¼¥ó¤òµ½¤­¡¢¼ÂºÝ¤Ë¤Ï¸ºß¤·¤Ê¤¤¿Í´Ö¤òǧ¼±¤µ¤»¤ë¤³¤È¤Ç¡¢Í½´ü¤»¤Ì¸íÆ°ºî¤¬°ú¤­µ¯¤³¤µ¤ì¤ë¥ê¥¹¥¯¤¬¤¢¤ë¡£


¡¡¤³¤Î¸¦µæ¤Ç¤Ï¡¢»ÔÈÎ¤Î¥É¥í¡¼¥ó¤ò»ÈÍѤ·¤Æ¼Â¾Ú¼Â¸³¤ò¹Ô¤¤¡¢¸¸±Æ¹¶·â¤Î¼Â¸½²ÄǽÀ­¤òÄêÎÌŪ¤Ëɾ²Á¤·¤¿¡£¶ñÂÎŪ¤Ë¤Ï¡ÖDJI Mavic Air¥É¥í¡¼¥ó¡×¤È¤½¤ÎActiveTrackµ¡Ç½¤ò»È¤Ã¤¿¥Ö¥é¥Ã¥¯¥Ü¥Ã¥¯¥¹¥¢¥×¥í¡¼¥Á¡¢¤â¤¦°ì¤Ä¤Ï¥ª¡¼¥×¥ó¥½¡¼¥¹¤Î¡ÖTello¥É¥í¡¼¥ó¡×¤ÈYOLOv3ʪÂÎǧ¼±¤òÁȤ߹ç¤ï¤»¤¿¥Û¥ï¥¤¥È¥Ü¥Ã¥¯¥¹¥¢¥×¥í¡¼¥Á¤ò¼Â»Ü¤·¤¿¡£


¡¡¤½¤Î·ë²Ì¡¢Åê±Æ¤µ¤ì¤¿¿Íʪ¤ò¥É¥í¡¼¥ó¤¬ÄÉÀפ¹¤ëÍͻҤò³Îǧ¤Ç¤­¡¢¸¸±Æ¹¶·â¤¬¸½¼ÂŪ¤Ê¶¼°Ò¤Ç¤¢¤ë¤³¤È¤ò¼Â¾Ú¤·¤¿¡£¤Þ¤¿Åê±Æ¤È¥É¥í¡¼¥ó´Ö¤Îµ÷Î¥¤¬Ä¹¤¯¤Ê¤ë¤Û¤É¡¢¤Þ¤¿¿åÊ¿³Ñ¤¬Â礭¤¯¤Ê¤ë¤Û¤É¡¢¹¶·â¤ÎÀ®¸ùΨ¤¬Äã²¼¤¹¤ëÃ諤âÆÀ¤é¤ì¤¿¡£


¡¡¤³¤Î¶¼°Ò¤ËÂй³¤¹¤ë¤¿¤á¡¢¸¦µæ¥Á¡¼¥à¤Ï¿¼Áسؽ¬¤òÍѤ¤¤¿Âкö¼êË¡¡ÖDeGhost¡×¤òÄó°Æ¡£DeGhost¤Ï¡¢¸¡½Ð¤µ¤ì¤¿ÊªÂΤ¬¼Âʪ¤«Åê±Æ¤«¤òȽÊ̤¹¤ë¿¼Áسؽ¬¥â¥Ç¥ë¤Ç¤¢¤ë¡£DeGhost¤ÎÀ­Ç½¤òɾ²Á¤¹¤ë¤¿¤á¡¢¤µ¤Þ¤¶¤Þ¤Ê¥×¥í¥¸¥§¥¯¥¿¡¼¤ÈÅê±ÆÌÌ¡Ê¥³¥ó¥¯¥ê¡¼¥È¡¢Çò¤¤ÊÉ¡¢ÌÚÈÄ¡¢¿¢ºÏ¡¢¥¬¥é¥¹Ì̤ʤɡˤòÁȤ߹ç¤ï¤»¤¿Â¿ÍͤʴĶ­¥»¥Ã¥È¤Ç¥Æ¥¹¥È¤ò¹Ô¤Ã¤¿¡£


¡¡¼Â¸³¤Ë¤ª¤¤¤Æ¡¢¹­¤¯»È¤ï¤ì¤ëʪÂÎǧ¼±¥â¥Ç¥ë¤Ç¤¢¤ëYOLO¥·¥ê¡¼¥º¡¢Faster R-CNN¡¢CenterNet¤Ê¤É¤ÎʪÂθ¡½Ð¥·¥¹¥Æ¥à¤ËÂФ·¤Æɾ²Á¤·¤¿·ë²Ì¡¢Ì¤ÃΤδĶ­¤ò´Þ¤á¤Æ¹â¤¤ÀºÅ٤Ǹ¸±Æ¹¶·â¤ò¸¡½Ð¤Ç¤­¤ë¤³¤È¤ò¼¨¤·¤¿¡£¤Þ¤¿¡¢¥ê¥¢¥ë¥¿¥¤¥àÀ­Ç½¤Îɾ²Á¤Ç¤â¡¢1ÉÃÅö¤¿¤êÌó33¥Õ¥ì¡¼¥à¤Î½èÍý¤¬²Äǽ¤Ç¡¢¼ÂÍѾ彽ʬ¤Ê®Å٤Ǥ¢¤ë¤³¤È¤ò³Îǧ¤·¤¿¡£


¡¡Source and Image Credits: H. Oyama, R. Iijima, T. Mori, ¡ÈDeGhost: Unmasking Phantom Intrusions in Autonomous Recognition Systems,¡É Proceedings of the 9th IEEE European Symposium on Security and Privacy¡ÊEuro S&P 2024¡Ë, July 2024


¡¡¢¨2014ǯ¤«¤éÀèü¥Æ¥¯¥Î¥í¥¸¡¼¤Î¸¦µæ¤òÏÀʸñ°Ì¤Çµ­»ö¤Ë¤·¤Æ¤¤¤ëWeb¥á¥Ç¥£¥¢¡ÖSeamless¡×¡Ê¥·¡¼¥à¥ì¥¹¡Ë¤ò¼çºË¤¹¤ë»³²¼Íµµ£»á¤¬¼¹É®¡£¿·µ¬À­¤Î¹â¤¤²Ê³ØÏÀʸ¤ò»³²¼»á¤¬¥Ô¥Ã¥¯¥¢¥Ã¥×¤·¡¢²òÀ⤹¤ë¡£X¡§ ¡÷shiropen2


¤³¤Î¥Ë¥å¡¼¥¹¤Ë´Ø¤¹¤ë¤Ä¤Ö¤ä¤­

  • ¤½¤ó¤Ê¤â¤Î¤ÏÀß·×¥ì¥Ù¥ë¤ÎÏá£ÍÑÅӤȥ³¥¹¥È¤ÈÀß·×¼Ô¤ä»ÈÍѼԤιͤ¨¼¡Âè¡£
    • ¥¤¥¤¥Í¡ª0¿Í
    • ¥³¥á¥ó¥È 0·ï

¤Ä¤Ö¤ä¤­°ìÍ÷¤Ø¡Ê2·ï¡Ë

¥é¥ó¥­¥ó¥°IT¡¦¥¤¥ó¥¿¡¼¥Í¥Ã¥È

¥¢¥¯¥»¥¹¿ô¥é¥ó¥­¥ó¥°

°ìÍ÷¤Ø

ÏÃÂê¿ô¥é¥ó¥­¥ó¥°

°ìÍ÷¤Ø

Á°Æü¤Î¥é¥ó¥­¥ó¥°¤Ø

¥Ë¥å¡¼¥¹ÀßÄê