Exploring Practical Vulnerabilities of Machine Learning-based Wireless Systems

Zikun Liu, Changming Xu, Emerson Sie, Gagandeep Singh, Deepak Vasisht

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Machine Learning (ML) is an increasingly popular tool for designing wireless systems, both for communication and sensing applications. We design and evaluate the impact of practically feasible adversarial attacks against such ML-based wireless systems. In doing so, we solve challenges that are unique to the wireless domain: lack of synchronization between a benign device and the adversarial device, and the effects of the wireless channel on adversarial noise. We build, RAFA (RAdio Frequency Attack), the first hardware-implemented adversarial attack platform against ML-based wireless systems and evaluate it against two state-of-the-art communication and sensing approaches at the physical layer. Our results show that both these systems experience a significant performance drop in response to the adversarial attack.

Original languageEnglish (US)
Title of host publicationProceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2023
PublisherUSENIX Association
Pages1801-1817
Number of pages17
ISBN (Electronic)9781939133335
StatePublished - 2023
Event20th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2023 - Boston, United States
Duration: Apr 17 2023Apr 19 2023

Publication series

NameProceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2023

Conference

Conference20th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2023
Country/TerritoryUnited States
CityBoston
Period4/17/234/19/23

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Control and Systems Engineering

Fingerprint

Dive into the research topics of 'Exploring Practical Vulnerabilities of Machine Learning-based Wireless Systems'. Together they form a unique fingerprint.

Cite this