Skip to content

wuhanstudio/adversarial-camera

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Man-in-the-Middle Attack against Object Detection

This project uses a Raspberry Pi 4 to fool the object detection system in real-time.

[ Talk ] [ Video ] [ Paper ] [ Code ]

We use a Raspberry Pi 4 to eavesdrop and manipulate the video stream transferred over the USB cable.

The linux program that injects the perturbation and simulates a virtual USB camera can be found here: uvc-gadget.

The Man-in-the-Middle Attack consists of two steps:

Quick Start

We’ve released pre-built images for Raspberry Pi 4 that can be flashed to microSD cards:

  • For development: raspbian_minm_attack.img
  • For release: buildroot_minm_attack.img

Checkout the latest release.


WHite-box Adversarial Toolbox (WHAT)

Build Status PyPI version License: MIT PyPI - Python Version

Alternatively, you can try real-time white-box attacks using our toolbox.

Installation

pip install whitebox-adversarial-toolbox

Usage (CLI)

Usage: what [OPTIONS] COMMAND [ARGS]...

  The CLI tool for WHitebox-box Adversarial Toolbox (what).

Options:
  --help  Show this message and exit.

Commands:
  attack   Manage Attacks
  example  Manage Examples
  model    Manage Deep Learning Models