FIRST, the combination of various methods for attack imperceptibility reminds if its mimicry abilities. SECOND, applying target-specific changes for better transferability reminds of its cleverness and ability to adapt to the environment. THIRD, one-shot black-box targeted attack reminds of its well-planned behavior with long preparation and fast, precise action.
It’s a fundamental problem of all facial recognition algorithms, and it’s vital to ensure that AI-driven solutions are safe and trustworthy.
According to our report “The Road to secure and Trusted AI”, the Internet industry is the most popular target for Adversarial ML attacks (29%) and Facial Recognition is one of the most attacked AI applications (2nd place) after image classification.
In our mission to Secure and Trusted AI, our aim was to demonstrate that the AI industry is woefully unprepared for AI regulations, at least from a security standpoint.
Adversarial Octopus attack is multi-functional (evasion or poisoning), it’s one-shot black box and transferable across various environments and applications and it combines various methods for higher attack accuracy.
It brings huge reputational risks for businesses and identity theft risks for individuals. Criminals can collect personal information and further commit identity fraud. This could have a significant impact on your personal life including your finances.
Face recognition is one of the most popular AI technologies. It is a significant part not only of biometrics and surveillance applications but is also used in retail, finance, internet, robotics, advertising, and almost every industry.
The current attack is demonstrated in a digital environment; however, the approach behind this attack is able to construct physical attacks as well, with the same method we can apply adversarial filters on physical objects like sunglasses.
Learn more in our report
Recently, an analytical report “The road to Secure and Trusted AI” was released. It contains a detailed analysis of more than 2000 security-related research papers to describe the most common AI vulnerabilities, real-life attacks, recommendations, and predictions for the industry’s further growth.