Physical ID-Transfer Attacks against Multi-Object Tracking via Adversarial Trajectory

Chenyi Wang, Yanmao Man, Raymond Muller, Ming Li, Z. Berkay Celik, Ryan Gerdes, Jonathan Petit

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Multi-Object Tracking (MOT) is a critical task in computer vision, with applications ranging from surveillance systems to autonomous driving. However, threats to MOT algorithms have yet been widely studied. In particular, incorrect association between the tracked objects and their assigned IDs can lead to severe consequences, such as wrong trajectory predictions. Previous attacks against MOT either focused on hijacking the trackers of individual objects, or manipulating the tracker IDs in MOT by attacking the integrated object detection (OD) module in the digital domain, which are model-specific, non-robust, and only able to affect specific samples in offline datasets. In this paper, we present ADVTRAJ, the first online and physical ID-manipulation attack against tracking-by-detection MOT, in which an attacker uses adversarial trajectories to transfer its ID to a targeted object to confuse the tracking system, without attacking OD. Our simulation results in CARLA show that ADVTRAJ can fool ID assignments with 100% success rate in various scenarios for white-box attacks against SORT, which also have high attack transferability (up to 93% attack success rate) against state-of-the-art (SOTA) MOT algorithms due to their common design principles. We characterize the patterns of trajectories generated by ADVTRAJ and propose two universal adversarial maneuvers that can be performed by a human walker/driver in daily scenarios. Our work reveals under-explored weaknesses in the object association phase of SOTA MOT systems, and provides insights into enhancing the robustness of such systems.

Original languageEnglish (US)
Title of host publicationProceedings - 2024 Annual Computer Security Applications Conference, ACSAC 2024
PublisherAssociation for Computing Machinery
Pages957-973
Number of pages17
ISBN (Electronic)9798331520885
DOIs
StatePublished - 2024
Event40th Annual Computer Security Applications Conference, ACSAC 2024 - Honolulu, United States
Duration: Dec 9 2024Dec 13 2024

Publication series

NameProceedings - Annual Computer Security Applications Conference, ACSAC
ISSN (Print)1063-9527

Conference

Conference40th Annual Computer Security Applications Conference, ACSAC 2024
Country/TerritoryUnited States
CityHonolulu
Period12/9/2412/13/24

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Physical ID-Transfer Attacks against Multi-Object Tracking via Adversarial Trajectory'. Together they form a unique fingerprint.

Cite this