CCD Sensor Attack Insights
CCD Sensor Attack Insights
2022.
attacks against their main component — the image sensor. However, or under-exposed, an alarm is triggered [30, 31].
these attacks are limited to coarse-grained and often suspicious In this paper, we overcome these limitations by using intentional
injections because light is used as an attack vector. Furthermore, electromagnetic interference (EMI). We show that fine-grained per-
due to the nature of optical attacks, they require the line-of-sight turbations can be injected into CCD image sensors using electro-
between the adversary and the target camera. magnetic emanation. While the susceptibility of CCD image sensors
In this paper, we present a novel post-transducer signal injection against electromagnetic interference has been evaluated in the con-
attack against CCD image sensors, as they are used in professional, text of electromagnetic compatibility (EMC) [37], to the best of our
scientific, and even military settings. We show how electromag- knowledge, no research has been conducted from the perspective
netic emanation can be used to manipulate the image information of an adversary trying to inject fine-grained, controlled perturba-
captured by a CCD image sensor with the granularity down to tions using intentional EMI. Yet, we demonstrate that, due to their
the brightness of individual pixels. We study the feasibility of our architecture, CCD image sensors are vulnerable to post-transducer
attack and then demonstrate its effects in the scenario of automatic signal injection attacks using electromagnetic waves.
barcode scanning. Our results indicate that the injected distortion With ideal conditions and information, an attacker could exploit
can disrupt automated vision-based intelligent systems. the vulnerability to reproduce arbitrary patterns within the output
of the image sensor; however, such conditions are unlikely in the
1 INTRODUCTION real world. Instead, we show the impact of the attack in a far more
achievable setting by disrupting the correct operation of barcode
Over the last few decades, the underlying architecture of image reading, as used heavily in manufacturing and logistics [13, 41].
sensors has experienced a significant shift in technology. Nowa- Such an attack on automated barcode reading is simple to mount
days, two major image sensor architectures exist — Complementary but has an immediate economic impact on the victim.
Metal-Oxide-Semiconductor (CMOS) and Charge-Coupled Device
(CCD) image sensors. Due to the improved semiconductor man- Contributions Specifically, we make the following contributions:
ufacturing process, the production costs of CMOS image sensors
have decreased immensely, while the performance of the sensors • We present a novel, post-transducer signal injection attack
increased. As a result, CMOS image sensors have almost entirely against CCD image sensors and demonstrate how an ad-
replaced CCD image sensors in consumer devices, such as mobile versary can gain fine-grained control over the brightness
and IoT devices, autonomous vehicles, retail, and surveillance. intensity down to individual pixels.
However, due to their excellent photometric performance and • We analyze the susceptibility of two CMOS image sensors
their capability to capture frames without geometric distortions, against the same attack to underpin our hypothesis that the
CCD image sensors are still used in specific professional and scien- signal injection attack is possible due to the architecture of
tific applications [6, 12]. The fields of application range from ground CCD image sensors.
and space astronomy [7, 11] over microscopy [15], industrial au- • We demonstrate the consequences of a signal injection at-
tomation [28] to military surveillance and defense systems [10, 26]. tack against CCD image sensors in the context of automatic
With the increasing usage of intelligent systems that make safety- barcode scanning as it is heavily used in manufacturing and
critical decisions based on the trusted captured image information, logistics.
the integrity of the camera inputs has become crucial. Various at- • We lay the basis for further evaluation of signal injection
tacks against camera-based systems compromising the integrity attacks against CCD image sensors.
have been demonstrated in academic literature [17, 20, 23, 45]. Since
image sensors are optical sensors, the most obvious attack vector is 2 RELATED WORK
the injection of light. However, injecting light in a controlled way Academic literature has presented signal injection attacks against
is almost infeasible and only partially possible for CMOS image a variety of sensors and devices, such as medical devices [16, 21],
sensors that implement an electronic rolling shutter mechanism voice-controlled personal assistants [29, 46], thermometers [47],
that reads the captured image information row by row, rather than MEMS inertial sensors [33, 34], air-pressure sensors [35], and Ad-
all-at-once (global shutter) [17, 23]. In contrast, CCD image sen- vanced Driver Assistance Systems (ADAS) [5, 18, 43, 45]. Depending
sors always implement a global shutter inherent to their design. on the target, the attack vector can range from acoustic waves over
This means fine-grained signal injection attacks using light are optical emission to electromagnetic emanation [8, 44]. Furthermore,
Final
Final
Sensor Part Scanning Element Measurement Unit and CCD image sensors is the order in which these components
Image
ImageArea
Area Image
ImageArea
Area are arranged. While CMOS image sensors have a measurement
Pixel
Pixel
Image Area Image Area
Pixel
Pixel unit integrated into each pixel, CCD image sensors rely on a single
Pixel
Pixel measurement unit [19]. A comparison of the two image sensor
architectures is depicted in Figure 1. In the following, we will focus
CircuitCircuit
Circuit
CCD CCD CCD
on the architecture of CCD image sensors.
AccessAccess
Access
VerticalVertical
Vertical
Vertical
Vertical
3.1 Photodiode Array
Vertical
The photodiode array is the sensing part of an image sensor. A two-
dimensional array composed of photodiodes, also known as pixels,
Horizontal
Horizontal Access
Access Circuit
Circuit captures image information in the form of light. More precisely,
Horizontal
Horizontal CCD
CCD
incident photons are captured and converted into a signal charge.
(a) IT-CCD image sensor
Horizontal CCD layout (b) CMOSHorizontal
image Access Circuit
sensor layout The longer a photodiode is exposed to light, the more photons are
captured and the higher is the resulting signal charge. However,
Figure 1: Simplified schematic representation of an each photodiode only captures the intensity for one of the three
Interline-Transfer-CCD (IT-CCD) and a CMOS image sen- color channels — red (R), green (G), or blue (B). This is achieved
sor. The CCD image sensor uses one measurement unit, by overlaying a Color-Filter Array (CFA) on top of the photodiode
while the CMOS image sensor implements one per pixel. array. The most well-known and most commonly used CFA is the
Bayer-Matrix. Since the human eye perceives green tones more
intensively [19], the Bayer-Matrix divides the image area into 50%
signal injection attacks can be differentiated based on the compo- green, 25% blue, and 25% red pixels [4]. To reconstruct an image
nent they are targeting. If an untrustworthy sensor measurement from the raw color information per pixel, a process known as de-
is directly injected into the transducer using the same physical mosaicing is necessary.
quantity the sensor is intended to sense, it is called a pre-transducer Usually, the number of physical pixels (photodiodes) exceeds the
attack. In contrast, in post-transducer signal injection attacks, the maximum resolution of the captured frames. The additional pixels
signal is induced in any component after the sensing part, for exam- do not directly contribute to the final images. However, they provide
ple, into a wire connecting the transducer and the microcontroller, useful supplementary information, such as color information, and
via electromagnetic coupling [44]. For cameras, which have become help to determine the boundaries of the frames.
a popular target due to their widespread use, pre-transducer attacks As described earlier, the longer the photodiodes are exposed to
using optical radiation as the attack vector are the most obvious incident light, the brighter the resulting image. To capture enough
route to go. For instance, shining a laser at the camera of a vehicle signal charge in low light conditions, the auto-exposure mechanism
is a cheap and effective attack to render its ADAS useless [20, 45]. of the camera adjusts the exposure time to an optimal value. Once
With a little more effort, the rolling shutter mechanism in CMOS sufficient signal charge is accumulated, i.e., the integration period
image sensors can be exploited to execute a more controlled signal finished, the signal charge is read out by the scanning element and
injection attack [17, 23]. Although exploiting the rolling shutter is transferred to the measurement unit, which will be discussed next.
less disruptive than fully blinding the camera, using visible light will
always be suspicious and, potentially, be easily detected [31]. More-
over, the attack is bound to row-wise injections and therefore only 3.2 Scanning Element
allows coarse perturbations [17, 23]. In addition, signal injection The scanning element is responsible for recovering the signal charge
attacks involving optical emission require line-of-sight between from the photodiodes and the transmission to the measurement unit.
the adversary and the target camera. In contrast, leveraging elec- In an Interline-Transfer-CCD (IT-CCD) image sensor, the scanning
tromagnetic waves as the attack vector gives the adversary precise element is composed of multiple shift registers, which are arranged
control over the perturbation from outside the line-of-sight. In fact, horizontally and vertically and thus are often referred to as H-
with the appropriate equipment, manipulating the signal charge CCD and V-CCD. A simplified schematic representation of such
of individual pixels is possible. In this paper, we present a novel an image sensor is depicted in Figure 1a. Once the integration
post-transducer signal injection attack that enables an adversary to period for a frame is completed, the generated signal charge is
obtain such a capability by exploiting the architectural structures of shifted from the photodiodes into the V-CCDs. For this reason,
CCD image sensors using an off-the-shelf software-defined radio. the horizontal and vertical CCDs can also be seen as a memory
buffer [19]. With the shift of the signal charge into the V-CCD, the
3 IMAGE SENSOR FUNDAMENTALS new integration period starts. While the new frame is captured,
Independent of the image sensor architecture, i.e., CMOS or CCD, the signal charge is simultaneously shifted row by row into the H-
the fundamental components of an image sensor are the same. CCD, before it is measured and amplified by the measurement unit.
All image sensors have a sensing part that captures the incident Figure 2 illustrates the readout process of an Interline-Transfer-
light, a scanning element that is responsible for the recovery of the CCD. Although CCD image sensors implement a global shutter —
generated signal charge, and a measurement unit that quantifies meaning the exposure and signal recovery happens all-at-once —
and amplifies the signal charge. The main difference between CMOS the digitization is still a sequential process. This means that the
Signal Injection Attacks against CCD Image Sensors
analog-to-digital converter (ADC) samples the pixels one-by-one, We assume the attacker can approach the target close enough to
starting with the pixel at (0,0). mount an attack, for some given transmission power, but since it is
an electromagnetic attack, line-of-sight is not required.
However, under no circumstances can the attacker access the
3.3 Measurement Unit video output of the target camera. Hence, no synchronization be-
tween the attack signal and the camera readout is possible. As we
As the name indicates, the measurement unit is responsible for
discuss later, this condition substantially limits the fidelity with
quantizing and amplifying the captured signal charge per pixel.
which an attacker can recreate an image at the target; however, we
The measurement unit usually consists of an ADC and an amplifier.
argue that it is by far the most realistic case.
The ADC samples the analog signal, in the case of the image sensor
the signal charge of each pixel, and maps it to a discrete value,
usually ranging between 0 and 255. The exact range depends on 5 SIGNAL INJECTION ATTACK
the resolution of the ADC. A higher resolution means that the Normally, a sensor should only react to the one specific physical
analog signal can be mapped to more discrete values. The higher stimulus it is intended to capture. In the case of an image sensor this
the amplitude of the continuous signal, the higher the discrete stimulus is light and the result is the generation of signal charge
value the sample it is mapped to. Intuitively, higher distinct values from photodiodes, which is then measured and digitized.
represent a higher brightness. As described before, in poor ambient It is typical for electronic devices to display some susceptibility
light conditions, the exposure time has to be extended to capture to electromagnetic interference, wherein incident electromagnetic
enough light. However, depending on the purpose of application, it radiation induces a voltage in components or connections within
might not be possible to increase the exposure time further. Once the device. In an image sensor, this may lead to the charge that
the integration time is longer than 1/𝐹 seconds, where 𝐹 is the frame was originally accumulated by the photodiodes subsequently being
rate of the camera, the frame rate drops. In such a case, to still be altered by additional charge due to induced voltages in downstream
able to compensate for poor ambient light while ensuring a stable components.
frame rate, the automatic gain controller (AGC) integrated with the The image sensor itself cannot determine whether the signal
measurement unit increases the analog gain used to amplify the charge was generated by the photodiode array or resulted from elec-
measured signal charge. tromagnetic interference that coupled onto the circuit. A malicious
In contrast to CMOS image sensors, where each individual pixel actor could leverage these factors and emit electromagnetic waves
is equipped with a measurement unit, the signal charge in CCD at the resonant frequency of elements within the target CCD im-
image sensors is shifted through various components before it is age sensor to induce a voltage and subsequently alter the captured
quantized and amplified. As a result, there are more places where image information.
interference can occur. This means that any noise that occurred Our hypothesis is that, due to their architecture, CCD image sen-
before the amplification, such as dark current shot noise, is also sors are particularly susceptible to the effects of such post-transducer
amplified. As a result, a voltage induced by electromagnetic inter- signal injection attacks. Three main architectural factors contribute
ference will also be amplified, making CCD image sensors more to this:
susceptible to interfering signals [19].
(1) long signal charge pathway – each of the components
through which signal charge is shifted may be affected by
4 THREAT MODEL incident electromagnetic radiation to facilitate signal injec-
tion
The overarching goal of the adversary is to spoof the image infor- (2) amplification of signal charge – increasing the effect of
mation captured by a CCD image sensor using electromagnetic injected signals prior to amplification
interference. Depending on the scenario, the attacker may wish to (3) serialization of pixels for digitization – meaning that
inject adversarial examples in order to disrupt vision-based intelli- injected signals can be targeted to single pixels
gent systems for object detection or identification. Alternatively,
they may wish to degrade raw images as captured by microscopes Figure 3 illustrates the attack being used to inject the ACM logo
or astronomical instruments, to harm research efforts. In a surveil- into an otherwise empty image. The addition of a malicious signal
lance context, the goal may be to distort images such that further above the legitimate signal can be seen, along with impairments in
malicious behavior is not recorded accurately. image reproduction due to lack of synchronization.
We assume that the attacker has knowledge of the target device, The amount of maliciously induced signal charge depends on the
sufficient to find technical specifications of the image sensor from received power of the attack signal. Intuitively, a physical signal
a datasheet and access an independent unit to profile for effective with higher amplitude induces a greater voltage, which in turn
signal injection frequencies. increases the brightness of the resulting frame. The received power
We assume the adversary has access to off-the-shelf equipment, is influenced by many factors, such as the attacker’s transmission
such as software-defined radios, amplifiers and antennas. The at- power, the distance, losses during propagation and the efficiency
tacker’s equipment is assumed to be powerful enough to generate of coupling within the image sensor components. As not all factors
and modulate an attack signal sufficiently quickly to match the are under the attacker’s control, they can primarily enhance the
performance of the targeted image sensor. We also presume that effects of the attack either by increasing their transmission power
the attacker is capable of generating an arbitrary attack signal. or reducing their distance to the target.
Sebastian Köhler, Richard Baker, and Ivan Martinovic
Figure 2: Illustration of a readout of the generated signal charge from an IT-CCD with Bayer color filter array.
Malicious Signal Charge Legitimate Signal Charge in other words to one pixel. The attacker can calculate the readout
o
Analog Signal
rate for the sensor from datasheet values, or empirical testing, and
Cm adjust their transmission rate accordingly. However, it is important
to note that while the attacker can match the rate, they cannot
Cl synchronize the attack signal to the readout signal in absolute terms
— as, per our threat model, they have no feedback channel for this
t
information. This gives rise to a time offset error 𝑜, between the
injected signal and the legitimate signal. The offset error manifests
variously as a translation within the frame to the offset coordinates
Resulting Frames
𝑥ˆ and 𝑦,
ˆ a dispersion of intensity across adjacent pixels and as a color
ŷ distortion due to color channels being misaligned. We elaborate on
this below.
x̂
5.1 Attack Execution
Executing a signal injection attack against a CCD image sensor can
Frame n − 1 Frame n be separated into three steps. In this section, we will give a detailed
overview of the necessary tasks.
Figure 3: Detailed illustration of how the signal injection at- In general, any arbitrary data can be modulated onto a carrier
tack affects the capturing of frames. The upper part shows wave and induced into the image sensor. In the simplest case, Gauss-
the signal charge in the time-domain before it is digitized. ian white noise can be injected in order to apply random pertur-
After the time offset 𝑜, the attack signal couples onto the im- bations to the image. However, to demonstrate the possibilities of
age sensor, increasing the amplitude of the legitimate signal the attack, we will describe in the following the injection of data in
charge 𝐶𝑙 by the malicious amplitude 𝐶𝑚 . The lower part of the format of an RGB image, as Figure 3 depicts. The content of the
the figure shows the resulting frames. Due to the misalign- injected image can be arbitrary and suited to the scenario, perhaps
ment 𝑜 between the readout and the malicious signal, the comprising recognizable patterns or barcodes, masking patterns,
induced noise is offset by 𝑥ˆ and 𝑦.
ˆ As a result, the distortion or adversarial examples.
is stretched along two consecutive frames.
Signal Generation. The origin of the attack signal is a source
image of known width and height in RGB format (i.e., three color
channels: red, green, blue). In the context of this paper, each pixel
Since the signal charge is amplified and quantized at the last
of the input image corresponds to one symbol of the attack signal.
step of the readout process, the maliciously induced signal is also
The pixels are read sequentially from the source image, with an
amplified. Under attack, the total brightness of a pixel, represented
order corresponding to the readout order from the target device.
by luma 𝑌 , is the sum of the legitimate signal and the additional
The brightness of the source pixel dictates the amplitude of the
induced voltage, and can formally be expressed as:
modulated attack signal, such that the relative brightnesses are
recreated at the target. In case the resolution of the input image is
𝑌 = 𝛼 (𝐶𝑙 + 𝐶𝑚 ), (1) smaller than the resolution of the target image sensor, padding has
where 𝛼 is the amplifier gain set by the image sensor, 𝐶𝑙 the signal to be applied to the attack signal. No signal charge is intended to be
charge captured by the sensing part and 𝐶𝑚 the maliciously induced induced for missing pixels, so the amplitude for these pixels is set
signal. It is important to note that the attacker cannot produce a to zero. Likewise, if the input image has a transparent background
negative value of 𝐶𝑚 and can thus only increase the brightness (alpha channel), the amplitude for transparent pixels is set to zero.
of a pixel. Furthermore, the range of the ADC places a cap on the As briefly mentioned in Section 3.1, each photodiode only cap-
usable values of 𝑌 , so if the legitimate signal already saturates the tures the incident light for one wavelength (color). Assuming that
brightness, then an induced signal cannot brighten it further. the photodiode at (0,0) only captures light with a wavelength of
In order to gain fine-grained control over the injected noise, the around 520 nm (green), injecting a malicious signal into the image
attack signal has to be modulated at a rate equal to the readout sensor, while this photodiode is sampled, would intensify the green
rate of the image sensor. This means, one symbol of the attack color channel of the pixel in the final frame. Since it is not possible
signal corresponds to exactly one sample of the image sensor, or to reliably stimulate a specific color channel (owing to the lack
Signal Injection Attacks against CCD Image Sensors
Extracted Signal
Interpolation
f(x)
Row 1 Row 2 Row n − 1 Row n
Input Image
Carrier Wave
x
Modulated Attack Signal
Figure 4: Overview of the necessary steps to generate a malicious attack signal. First, the signal to be transmitted is extracted
from the input image by calculating the luminance 𝑌 for each pixel. Second, the extracted signal is interpolated to ensure
the different sample rates match. Finally, the interpolated signal is modulated onto the carrier wave and transmitted via the
software-defined radio.
POWER
connections via shielded RS232 adapters. For the DFM 25G445-ML
A D
6.2.2 Results. The results of the frequency sweep for both cam- them. However, as the gain increases, the noise floor in the captured
eras, the DFM 25G445-ML and the analog CCTV board camera, are frames increases, resulting in a lower structural similarity, even
visualized in Figure 7. As the graphs show, the most effective carrier between legitimate frames. To circumvent this issue and to facilitate
frequency was 190 MHz for the DFM 25G445-ML and 341 MHz for the comparison of the results, we calculated the change in SSIM
the analog CCTV board camera. At these respective frequencies values, Δ SSIM:
the distortion level was comparable for each camera, with SSIM
values below 0.4 in both cases. However, the range of effective Δ𝑆𝑆𝐼𝑀 = 𝑆𝑆𝐼𝑀𝑙𝑒𝑔𝑖𝑡𝑖𝑚𝑎𝑡𝑒 − 𝑆𝑆𝐼𝑀𝑚𝑎𝑙𝑖𝑐𝑖𝑜𝑢𝑠 . (4)
frequencies was different in each case. For the DFM 25G445-ML,
a wide range of frequencies had a noticeable effect on the image, where 𝑆𝑆𝐼𝑀𝑙𝑒𝑔𝑖𝑡𝑖𝑚𝑎𝑡𝑒 is calculated among legitimate frames only
while the analog camera exhibited only a small range of effective and 𝑆𝑆𝐼𝑀𝑚𝑎𝑙𝑖𝑐𝑖𝑜𝑢𝑠 is measured between legitimate and malicious
frequencies. For both cameras, the highest SSIM values were al- frames. This approach makes it easier to identify the additional
ready quite low, below 0.8 consistently. This is due to the cameras interference caused by the signal injection attack.
being set in auto mode, causing them to increase exposure and gain 6.3.2 Results. As can be seen in Figure 8a, for a high image sensor
settings in an attempt to compensate for the dark environment in gain, the signal strength of only -2.1 dBm was sufficient to induce
the shielded box. The impact of sensing noise is increased under a malicious signal charge into the CCD image sensor of the DFM
these circumstances. 25G445-ML. The results indicate that under such advantageous
These results indicate that an attacker could inject a malicious conditions for the adversary, increasing the transmission power to
signal for either camera and affect the output image substantially. 20.1 dBm (∼100 mW) can induce considerable noise.
The freedom for an attacker to select a convenient transmission Remarkably, however, the output power of the USRP was even
frequency depends on the target camera. enough to cause distortions when the amplifier of the measurement
Due to space constraints and the option to precisely control the unit was switched off. This suggests that the attacker is not reliant
camera parameters, such as exposure and gain, which allows us to upon vulnerable configuration within the target camera, as long
evaluate the attack under controlled conditions, the rest of the paper as they are able to increase their transmission power to compen-
will focus on the evaluation and results of the DFM 25G445-ML. sate. Indeed, increasing transmission power, rather than relying on
Nevertheless, since we know that the analog CCTV board camera high image sensor gain, is beneficial for the attacker. We observed,
is also vulnerable to signal injection attacks under the same attack somewhat surprisingly, that with the highest image sensor gain of
settings, the following findings will be applicable to it too. 29, the injected noise level was lower than with a gain of 25. This
was because at such a high gain, the low level sensing noise was
6.3 Transmission Power amplified such that it already saturated some pixels — making it
The transmission power of the malicious signal is a decisive factor impossible to further increase the signal charge for these pixels
for the success of the attack. Depending on the environment, target via the signal injection attack. Instead, if the gain is kept low, the
camera and its settings, the minimum required power varies. In attacker inject their signal with a high signal-to-noise ratio.
this section, we present an analysis of the relationship between
signal strength and the amount of induced distortions for the DFM 6.4 Attack Distance
25G445-ML. While the attack signal propagates through space, it is attenuated.
6.3.1 Method. To determine the minimum required transmission Therefore, the effect of the attack diminishes with increasing dis-
power under different settings and to evaluate the relationship tance between the target camera and the malicious transmitter. In
between the required output power and the amount of perturba- the following, we evaluated the feasibility of the attack for different
tions, we tested the DFM 25G445-ML at a fixed distance of 3 cm distance settings.
from the transmitting antenna. In accordance with the results of 6.4.1 Method. We used the same experimental setup as described
the frequency sweep, we set the carrier frequency to 190 MHz and previously and depicted in Figure 6. However, this time we fixed
then varied the transmission power from -6.8 dBm to 20.1 dBm the transmission power of the USRP to the maximum (20.1 dBm,
(output power at 𝑓𝑐 = 190 MHz as measured with an oscilloscope). ∼100 mW) and only varied the distance between the camera and the
We repeated the experiment for a range of camera gain settings. transmitting antenna. We emitted a sine wave with a frequency of
Under real-world conditions, the ambient lighting of the environ- 1 kHz that was modulated onto a carrier wave with 𝑓𝑐 = 190 MHz.
ment would influence the exposure and gain settings of the camera. In line with previous experiments, we collected three legitimate
However, there is an upper limit on the exposure value that can be and seven malicious frames for each distance setting. Due to the
used without reducing the frame rate. In low light level environ- size limitations of the shielded box, we had to restrict the evaluated
ments, for example indoors with only artificial lighting, it is highly distances to 3, 10, 20, and 50 cm. Again we calculated Δ SSIM
likely that a camera will increase the gain of the amplifier in the between legitimate and malicious frames.
measurement unit to compensate for the low ambient brightness.
For all experiments the exposure time was set to the smallest possi- 6.4.2 Results. Consistent with our expectations, Figure 8b shows
ble value (10 𝜇s), but the gain values ranged from 0 to 29 (unitless that, as the distance between the target and the transmitter in-
values as offered by the camera control software). creased, the amount of induced signal charge decreased. The re-
As with the previous experiments, we collected ten frames, three sults indicate that the transmission power of the USRP without
legitimate and seven malicious, and calculated the SSIM between an amplifier is not sufficient to inject distortions into the frames
Sebastian Köhler, Richard Baker, and Ivan Martinovic
0.8 0.8
0.6 0.6
SSIM
SSIM
0.4 0.4 341MHz
190MHz
0.2 0.2
50 1000 2000 3000 4000 5000 50 1000 2000 3000 4000 5000
Frequency fc (MHz) Frequency fc (MHz)
Figure 7: Results of the frequency sweep. The SSIM represents the similarity between the frames captured during normal
operation and while an attack signal at the carrier frequency 𝑓 c was emitted.
0 5 10 15 20 25 29
𝜆
0.4 𝑃𝑟 = 𝑃𝑡 + 𝐺𝑡 + 𝐺𝑟 + 20 log10 ( ), (5)
4𝜋𝑑
∆ SSIM
0.2 Our hypothesis is that CCD image sensors are vulnerable to in-
tentional EMI due to their architecture. As elaborated in Section 3,
the single measurement unit makes CCD image sensors more sus-
0.0 ceptible to noise. In contrast, CMOS image sensors that have a
3 10 20 50
measurement unit in each pixel would not be expected to be as
Distance (cm) susceptible, since the EMI has less opportunity to couple onto the
(b) SSIM vs. Distance
image sensor before the amplification process. We conducted an
experiment to verify this expectation.
Figure 8: Evaluation results for different camera gain set- 6.5.1 Method. We repeated the carrier frequency experiment de-
tings. The upper part depicts the relationship between the scribed in Section 6.2, using two CMOS cameras instead of CCD
transmission power 𝑃𝑜𝑢𝑡 and the amount of noise induced units. We tested a Logitech C922, a widely used webcam, and an
into the DFM 25G445-ML from a fixed distance of 3 cm. Axis M3045-V semi-professional dome surveillance camera. As with
The lower part illustrates how the injected noise diminishes the CCD cameras, we specifically chose these cameras based on
with increasing distance between the camera and the trans- their capability to manually adjust camera settings such as gain and
mitter for the maximum transmission power of 20.1 dBm. exposure. For each camera we selected an attack distance of 3 cm
and performed a carrier frequency sweep from 50 to 5000 MHz
with a step size of 1 MHz, while modulated by a 1 kHz sine wave.
We again captured three legitimate and seven malicious frames and
from more than 50 cm away. In such a setting, not even a high cam- computed the SSIM values.
era gain, the most beneficial setting for the adversary, is enough
to cause substantial image distortions. While this represents the 6.5.2 Results. In Figure 9, the results of the frequency sweep for the
limits of our experimental setup, higher received power could be two tested cameras are presented. As expected, the SSIM values for
stimulated straightforwardly by an attacker, in order to improve both cameras are consistently high, except for a few occasions for
the range of the attack — either by increasing transmission power the Logitech C922. We inspected and tested the carrier frequencies
or employing a directional antenna with higher gain. Based on the for the unexpectedly low SSIM values manually to investigate if
same assumptions as in [16], we can utilize the Friis transmission signal injection attacks at these frequencies would be possible.
equation to roughly estimate the requirements for an attack at a However, all attempts were unsuccessful. We suspect that the reason
certain distance 𝑑: for these outliers was most likely a problem in the communication
Signal Injection Attacks against CCD Image Sensors
1.0 1.0
2527MHz
3229MHz 3711MHz
SSIM
SSIM
0.8 0.8
0.6 0.6
50 1000 2000 3000 4000 5000 50 1000 2000 3000 4000 5000
Frequency fc (MHz) Frequency fc (MHz)
Figure 9: Results of the frequency sweep for the two tested cameras with CMOS image sensors. The SSIM represents the
similarity between the frames captured during normal operation and while an attack signal at the carrier frequency 𝑓 c was
emitted.
In this section, we show how an adversary can exploit fine-grained Experimental Setup. Similar to the experimental setup in the pre-
control over the captured image information. vious section, we placed the DFM 25G445-ML in the RF shielded
box 3 cm away from the transmitting antenna. However, addition-
6.6.1 Method. We replicated the experimental setup as previously ally, we placed a cardboard box with two barcodes together with
described and depicted in Figure 6. The camera was placed 3 cm a light inside the box. The camera parameters were set to match
away from the transmitting antenna, and the image sensor gain the settings that would be chosen by the automatic exposure and
was set to 29. We then executed the attack by following the steps automatic gain control for an indoor environment with artificial
described in Section 5. In the case of the DFM 25G445-ML, it was ceiling lighting, as it can be found, for instance, in a warehouse. To
easy to infer from the datasheet that the sample rate of the underly- be more precise, we tested exposure times ranging from 20,000 𝜇s
ing Sony ICX445AQA image sensor is 36 MHz. Based on the earlier to 33,000 𝜇s and image sensor gains from 0.0 to 8.7. The camera was
results, the transmission was made with 𝑓𝑐 = 190 MHz and peak connected to a PC running a Python script that captured frames
transmission power of 20.1 dBm. with a frame rate of 30 FPS. The captured frames were analyzed
6.6.2 Result. The resulting frame is shown in Figure 10. The banner 3 Forclarity in print, we give an artificially brightened version of the image in Appen-
image for the AsiaCCS 2022 conference is visible, with both the text dix B.
Sebastian Köhler, Richard Baker, and Ivan Martinovic
7 LIMITATIONS
In this section, we provide an overview of the limitations of our
evaluation and the signal injection attack itself.
Exposure = 20000µs Exposure = 28000µs Exposure = 33000µs Second, as described in Section 6.1, we only had access to a small
100
75
RF shielded enclosure. The dimensions of the box constrained the
setup of our experiments to short distances between the malicious
50
transmitter and the target camera. As a result, we only investigated
25
the attack success for short distances up to 50 cm. In addition,
0
0 4.7 6.7 8.7 0 4.7 6.7 8.7 0 4.7 6.7 8.7 we only tested the attack with a low output power of 100 mW
Camera Gain maximum to ensure that we comply with local regulations and
our signal does not interfere with any legitimate communication
Figure 12: Results of the automatic barcode scanning under channels.
different lighting settings.
7.2 Attack Limitations
The signal injection attack in its most basic approach, as it is pre-
for barcodes using the popular library pyzbar. If a barcode was sented in this paper, has some limitations that are difficult to work
detected, we stored the decoded data in a CSV file. For each param- around and have to be taken into account by the adversary.
eter configuration we collected 1,000 frames — 500 under normal Our threat model assumes that the adversary cannot access the
operation and 500 while emitting random noise at 𝑓𝑐 = 190 𝑀𝐻𝑧. video feed of the target camera. As described in Section 5, it is there-
The transmission power of the USRP was again set to the maximum fore not possible to synchronize the readout of the signal charge
(20.1 dBm). with the attack signal. This lack of synchronization introduces two
major issues. First, the injected perturbation appears at random
Results. The results of our experiments clearly show that in-
ˆ 𝑦),
locations (𝑥, ˆ making it impossible for the adversary to target
jecting random noise into a CCD image sensor used for barcode
specific parts of the frame. Second, as we showed in Section 5.1, it
scanning can substantially reduce the reliability of the scanning
is not possible to stimulate a certain color channel. Nevertheless,
system. In Figure 12, we present the results for different camera
depending on the intentions of the adversary, these limitations
settings. For the lowest selected exposure of 20,000 𝜇s and no addi-
might not be important. For instance, if the goal is to fool an object
tional amplification of the signal charge the captured frames were
detection algorithm, the attacker could draft adversarial examples
slightly underexposed. This led even during normal operation to
that are effective independent of the injected location [23]. We con-
a detection rate of only 50%. As such, it is not surprising that the
sider our assumptions realistic but limiting and highlight that if the
injected noise reduced the detection rate even further. However,
adversary could obtain synchronization, by monitoring the camera
increasing the exposure time and the gain improved the perfor-
output, they would enjoy far greater control over the final image.
mance under normal operation significantly, leading to a consistent
detection rate above 99%. At the same time, the attack effectiveness
diminished with increasing exposure time, and contrary to our 8 COUNTERMEASURES
expectations, for higher gains. This observation can be explained Countermeasures to protect sensors from signal injection attacks
by the increasing contrast between the white background and the can be divided into two categories — attack prevention and attack
black bars of the barcode. Nevertheless, under optimal settings, detection. In this section, we discuss various approaches for both
for instance, for 𝐸𝑥𝑝𝑜𝑠𝑢𝑟𝑒 = 20000 𝜇s and a gain of 8.7, the attack categories in the context of intentional EMI against CCD image
caused the detection rate to drop to 1%. In Figure 11, two example sensors.
Signal Injection Attacks against CCD Image Sensors
8.1 Attack Prevention architectures making them very expensive. Producing a dummy
The prevention of intentional EMI is challenging and can often be sensor with the exact same properties will almost certainly not only
seen as an arms race between the defender and the attacker. double the size, but also the price. Finally, it is not guaranteed that
the resonant frequency of the dummy sensor matches the one of
8.1.1 Shielding. The most obvious solution to prevent a malicious the original sensor.
signal from coupling onto the image sensor circuit is shielding.
However, sensors that have to interact with their surroundings 8.2.2 Modulating the Sensor. The detection mechanism PyCRA
are not easy to shield. For example, in the case of an image sen- proposed by [24] is another promising approach to detect signal
sor, light has to reach the photodiode array. While it is possible injection attacks. The idea is similar to the previously described
to add a fine metallic mesh in front of the sensing part, it dimin- dummy sensor. If an active sensor, i.e., a sensor with an emitter
ishes the quality of the captured frames and only provides limited and a sensing part, for example, a Light Detection and Ranging
protection. Furthermore, shielding affects the airflow and the ther- (LiDAR) sensor, does not emit a signal, the sensing part should not
mal dissipation. This is especially disadvantageous for CCD image be able to measure a response. If this is still the case, the probability
sensors since higher temperatures cause the generation of more that the signal is not authentic is relatively high and an alarm
dark current [42]. Moreover, retrofitting the camera with additional can be raised. The disadvantage of this method is that it is tied to
shielding is expensive, time-consuming, and potentially not even active sensors. To circumvent this limitation, [48] introduced the
possible. Finally, shielding cannot fully protect from malicious elec- idea of sensor modulation. A passive sensor only senses a physical
tromagnetic waves. Although shielding does attenuate the induced property and outputs a voltage when it is powered. If the sensor is
signal, the effectiveness depends on the thickness of the shield [32]. switched off, no voltage should be present on the sensor output and
A sophisticated adversary with powerful equipment might still be the microcontroller should measure 0 V. For both of the discussed
able to emit a signal that can penetrate the shielding and couple detection mechanisms, it is impossible for an attacker to inject a
onto the target image sensor. malicious signal without being detected if the sensors or the emitter
are turned on and off in an unpredictable, random sequence.
8.1.2 Camera Redundancy. Another straightforward protection ap-
proach is the usage of multiple cameras. Ideally, the second camera 8.2.3 Adapting existing Detection Mechanisms. For the detection
is equipped with a different image sensor model to reduce the likeli- of post-transducer signal injection attacks against CCD image sen-
hood that its circuitry will respond to the same resonant frequency. sors, we can adapt the two aforementioned detection techniques.
Nevertheless, adding camera redundancy significantly increases Since image sensors do not have an emitter, we can only control the
the costs and provides only limited improvement in protection, as sensing part. However, the photodiode array is always on, which
the attacker can still target both image sensors. means a signal charge is generated as soon as light falls onto it.
Therefore, instead of turning the sensor on and off, we propose
8.2 Attack Detection reducing the exposure time of the image sensor to the lowest pos-
Recent academic research has proposed multiple approaches to sible value for the duration of a single frame in an unpredictable,
detect signal injection attacks against different types of sensors. In random sequence. Due to the very short exposure time, none or
comparison to attack prevention mechanisms, detection approaches minimal signal charge should be generated. As in [24] and [48], if
can often be implemented in software and are easier to deploy the sensor still captures a signal, then it is highly likely that the
retrospectively. voltage was caused by EMI coupling onto the circuit. The main
advantage of this method is that it can be implemented in software
8.2.1 Dummy Sensor. Similar to camera redundancy, the authors
and deployed retrospectively. Unfortunately, this approach also
in [35] proposed a kind of sensor redundancy. However, the second
has drawbacks. First, the low exposure time renders the captured
sensor, which should be placed directly next to the sensor to be
frame useless, which subsequently reduces the frame rate. Second,
protected, is only a so-called dummy sensor. It is a duplicate of
in environments with high ambient light levels, such as outdoors
the original sensor with exactly the same circuit and properties to
on a sunny day, even the shortest exposure time might generate
ensure that it responds to the same resonant frequency. However, it
signal charge. Finally, depending on the image sensor, the noise
does not have a sensing part. Therefore, no voltage can be generated
floor caused by dark current noise could be sufficient to trigger the
through an external, physical stimulus leading to a sensor output
detection mechanism.
of always 0 V. In case the microcontroller can measure a voltage
at the sensor output, the signal was potentially injected via a post-
transducer signal injection attack. Since the observed signal from 9 CONCLUSION
the dummy sensor is the raw attack signal, it can be used to correct We have shown that CCD image sensors can be susceptible to inten-
the signal measured by the original sensor. tional electromagnetic interference. Our experiments suggest that
Although this approach could be applied to CCD image sensors, this susceptibility stems from the fundamental architecture of CCD
it has various drawbacks. The major disadvantage is that the total image sensors; as the phenomenon remains present across individ-
size of the image sensor would become twice as large. This is in par- ual designs and yet is absent in devices built on CMOS architectures.
ticular an issue for larger sensor arrays composed of multiple CCD The presented attack allows an adversary to manipulate the cap-
image sensors, as they are used in telescopes and satellites, since tured frames down to the granularity of single pixels. While CCD
doubling the size of the sensor array would be impractical. More- image sensors are no longer the dominant architecture, they are
over, such image sensors are highly complex with sophisticated still widely used in a range of professional applications. Therefore,
Sebastian Köhler, Richard Baker, and Ivan Martinovic
we conclude that the signal injection attacks we have shown pose [24] Yasser Shoukry, Paul Martin, Yair Yona, Suhas Diggavi, and Mani Srivastava.
a serious threat to applications relying on the input from cameras 2015. Pycra: Physical challenge-response authentication for active sensors under
spoofing attacks. In Proceedings of the 22nd ACM SIGSAC Conference on Computer
equipped with CCD image sensors. and Communications Security. 1004–1015.
[25] Pawan Sinha and Richard Russell. 2011. A perceptually based comparison of
image similarity metrics. Perception 40, 11 (2011), 1269–1281.
10 ACKNOWLEDGEMENTS [26] Jovan Skuljan. 2017. QuadCam–a quadruple polarimetric camera for space
Sebastian Köhler was supported by the EPSRC and the Hans Böckler situational awareness. In Proc. 18th AMOS Conf. 275–285.
[27] SONY. [n. d.]. ICX445AQA Datasheet. https://www.argocorp.com/
Foundation. cam/ImagingSource/common/PDF/sensor/icx445aqa_1.2.en_US.pdf
https://www.argocorp.com/cam/ImagingSource/common/PDF/sensor/
icx445aqa_1.2.en_US.pdf.
REFERENCES [28] The Imaging Source. [n. d.]. DFM 25G445-ML. https://www.
[1] Inc. Allied Automation. 2021. TC1200 Fixed Industrial Scanner. https://www. theimagingsource.com/products/board-cameras/gige-color/dfm25g445ml/
allied-automation.com/partners/datalogic/fixed-industrial-barcode-readers/ https://www.theimagingsource.com/products/board-cameras/gige-
[2] Amazon.com. [n. d.]. Jancane USB 2.0 Audio/Video Converter. https://amazon. color/dfm25g445ml/.
com/dp/B07NPFJJ7K [29] Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, and Kevin Fu.
https://amazon.com/dp/B07NPFJJ7K. 2020. Light commands: laser-based audio injection attacks on voice-controllable
[3] Amazon.com. [n. d.]. SONY CCTV Camera Color Board CCD. systems. In 29th USENIX Security Symposium (USENIX Security 20). 2631–2648.
https://www.amazon.com/dp/B0044M1VR6. [30] Synology. 2021. Synology Surveillance Station. https://synology.com/en-
[4] BE Bayer. 1976. Colour filter array. United States of America patent 3971065 us/surveillance https://synology.com/en-us/surveillance.
(1976). [31] Bosch Security Systems. 2016. FW 6.30 Tamper Detection. https://resources-
[5] Yulong Cao, Yimeng Zhou, Qi Alfred Chen, Chaowei Xiao, Won Park, Kevin boschsecurity-cdn.azureedge.net/public/documents/TN_VCA_tamper_detect_
Fu, Benjamin Cyr, Sara Rampazzi, and Z. Morley Mao. 2019. Adversarial sensor WhitePaper_enUS_22996235531.pdf
attack on LiDAR-based perception in autonomous driving. Proceedings of the https://resources-boschsecurity-cdn.azureedge.net/public/documents/TN_
ACM Conference on Computer and Communications Security (2019), 2267–2281. VCA_tamper_detect_WhitePaper_enUS_22996235531.pdf.
https://doi.org/10.1145/3319535.3339815 arXiv:1907.06826 [32] Xingcun Colin Tong. 2016. Advanced materials and design for electromagnetic
[6] Daniel Durini. 2019. High performance silicon imaging: Fundamentals and appli- interference shielding. CRC press.
cations of CMOS and CCD sensors. https://doi.org/10.1016/C2017-0-01564-1 [33] Timothy Trippel, Ofir Weisse, Wenyuan Xu, Peter Honeyman, and Kevin Fu.
[7] Dan M Duriscoe, Christian B Luginbuhl, and Chadwick A Moore. 2007. Mea- 2017. WALNUT: Waging doubt on the integrity of MEMS accelerometers with
suring night-sky brightness with a wide-field CCD camera. Publications of the acoustic injection attacks. In 2017 IEEE European Symposium on Security and
Astronomical Society of the Pacific 119, 852 (2007), 192. Privacy (EuroS&P). IEEE, 3–18.
[8] Ilias Giechaskiel and Kasper Rasmussen. 2020. Taxonomy and Challenges of Out- [34] Yazhou Tu, Zhiqiang Lin, Insup Lee, and Xiali Hei. 2018. Injected and delivered:
of-Band Signal Injection Attacks and Defenses. IEEE Communications Surveys Fabricating implicit control over actuation systems by spoofing inertial sensors.
Tutorials 22, 1 (2020), 645–670. https://doi.org/10.1109/COMST.2019.2952858 In 27th USENIX Security Symposium (USENIX Security 18). 1545–1562.
[9] Google. 2021. Google Cloud Vision API. [35] Yazhou Tu, Vijay Srinivas Tida, Zhongqi Pan, and Xiali Hei. 2021. Transduction
https://cloud.google.com/vision/docs/drag-and-drop. Shield: A Low-Complexity Method to Detect and Correct the Effects of EMI
[10] Eric Hagt and Matthew Durnin. 2009. China’s antiship ballistic missile: Develop- Injection Attacks on Sensors. In Proceedings of the 2021 ACM Asia Conference on
ments and missing links. Naval War College Review 62, 4 (2009), 87–115. Computer and Communications Security. 901–915.
[11] Steve B Howell. 2006. Handbook of CCD astronomy. Vol. 5. Cambridge University [36] International Communication Union. 2015. Recommendation ITU-R BT.709-6.
Press. https://www.itu.int/dms_pubrec/itu-r/rec/bt/R-REC-BT.709-6-201506-I!!PDF-
[12] Teledyne Imaging. 2020. The Future is bright for CCD Sensors. E.pdf.
https://www.teledyneimaging.com/media/1299/2020-01-22_e2v_the-future-is- [37] Robert Wacholc. 2019. Investigation into Noise and Stability Effects on CCD and
bright-for-ccd-sensors_web.pdf. Readout Electronics with Reference to the PLATO Mission. Ph. D. Dissertation. UCL
[13] SICK Inc. 2014. Automatic Identification Solutions for Logistics. https://www. (University College London).
sick.com/media/pdf/8/58/058/IM0059058.PDF [38] Zhou Wang and Alan C Bovik. 2002. A universal image quality index. IEEE signal
[14] Kenji Irie, Alan E Mckinnon, Keith Unsworth, and Ian M Woodhead. 2008. A processing letters 9, 3 (2002), 81–84.
model for measurement of noise in CCD digital-video cameras. Measurement [39] Zhou Wang, Alan C Bovik, Hamid R Sheikh, and Eero P Simoncelli. 2004. Image
Science and Technology 19, 4 (2008), 045207. quality assessment: from error visibility to structural similarity. IEEE transactions
[15] W Gray Jay Jerome. 2017. Practical guide to choosing a microscope camera. on image processing 13, 4 (2004), 600–612.
Microscopy Today 25, 5 (2017), 24–29. [40] Zhou Wang, Eero P Simoncelli, and Alan C Bovik. 2003. Multiscale structural sim-
[16] Denis Foo Kune, John Backes, Shane S Clark, Daniel Kramer, Matthew Reynolds, ilarity for image quality assessment. In The Thrity-Seventh Asilomar Conference
Kevin Fu, Yongdae Kim, and Wenyuan Xu. 2013. Ghost talk: Mitigating EMI signal on Signals, Systems & Computers, 2003, Vol. 2. Ieee, 1398–1402.
injection attacks against analog sensors. In 2013 IEEE Symposium on Security and [41] Daiyun Weng and Li Yang. 2012. Design and implementation of barcode manage-
Privacy. IEEE, 145–159. ment information system. In Information Engineering and Applications. Springer,
[17] Sebastian Köhler, Giulio Lovisotto, Simon Birnbach, Richard Baker, and Ivan 1200–1207.
Martinovic. 2021. They See Me Rollin’: Inherent Vulnerability of the Rolling [42] Ralf Widenhorn, Morley M Blouke, Alexander Weber, Armin Rest, and Erik
Shutter in CMOS Image Sensors. Bodegom. 2002. Temperature dependence of dark current in a CCD. In Sensors
[18] Yanmao Man, Ming Li, and Ryan Gerdes. 2020. GhostImage: Remote Percep- and Camera Systems for Scientific, Industrial, and Digital Photography Applications
tion Attacks against Camera-based Image Classification Systems. In 23rd In- III, Vol. 4669. International Society for Optics and Photonics, 193–201.
ternational Symposium on Research in Attacks, Intrusions and Defenses (RAID [43] Wenyuan Xu, Chen Yan, Weibin Jia, Xiaoyu Ji, and Jianhao Liu. 2018. Analyzing
2020). USENIX Association, San Sebastian, 317–332. https://www.usenix.org/ and enhancing the security of ultrasonic sensors for autonomous vehicles. IEEE
conference/raid2020/presentation/man Internet of Things Journal 5, 6 (2018), 5015–5029.
[19] Junichi Nakamura. 2006. Image sensors and signal processing for digital still [44] Chen Yan, Hocheol Shin, Connor Bolton, Wenyuan Xu, Yongdae Kim, and Kevin
cameras. 1–336 pages. https://doi.org/10.1201/9781420026856 Fu. 2020. Sok: A minimalist approach to formalizing analog sensor security. In
[20] Jonathan Petit, Bas Stottelaar, Michael Feiri, and Frank Kargl. 2015. Remote 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 233–248.
attacks on automated vehicles sensors: Experiments on camera and lidar. Black [45] Chen Yan, Wenyuan Xu, and Jianhao Liu. 2016. Can you trust autonomous
Hat Europe 11 (2015), 2015. vehicles: Contactless attacks against sensors of self-driving vehicle. DEF CON
[21] Kasper Bonne Rasmussen, Claude Castelluccia, Thomas S Heydt-Benjamin, and 24, 8 (2016), 109.
Srdjan Capkun. 2009. Proximity-based access control for implantable medical de- [46] Chen Yan, Guoming Zhang, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, and
vices. In Proceedings of the 16th ACM conference on Computer and communications Wenyuan Xu. 2019. The feasibility of injecting inaudible voice commands to
security. 410–419. voice assistants. IEEE Transactions on Dependable and Secure Computing (2019).
[22] Ettus Research. 2021. UBX 40 USRP Daughterboard. https://www.ettus.com/all- [47] Sophia Yan. 2019. How innovative Hong Kong protesters are using lasers, traffic
products/ubx40/. cones and parkour in battle with police. https://www.telegraph.co.uk/news/2019/
[23] Athena Sayles, Ashish Hooda, Mohit Gupta, Rahul Chatterjee, and Earlence Fer- 08/02/innovative-hong-kong-protesters-using-lasers-traffic-cones-parkour/
nandes. 2021. Invisible Perturbations: Physical Adversarial Examples Exploiting [48] Youqian Zhang and Kasper Rasmussen. 2020. Detection of electromagnetic
the Rolling Shutter Effect. In Proceedings of the IEEE/CVF Conference on Computer interference attacks on sensor systems. In 2020 IEEE Symposium on Security and
Vision and Pattern Recognition. 14666–14675. Privacy (SP). IEEE, 203–216.
Signal Injection Attacks against CCD Image Sensors
B POSTPROCESSED FIGURES
(b) 𝑓𝑐 = 290 MHz In the following, we present Figures 5 and 10 after being postpro-
cessed manually with the image editing software GIMP to improve
Figure 13: The same data modulated onto carrier waves with the visibility of the injected distortions for the printed version of
different frequency 𝑓𝑐 , causes different structured noise. this paper. More specifically, we increased the brightness, saturation
and contrast of the image.
Appendices
A ADDITIONAL RESULTS OF THE
FREQUENCY SWEEP TO FIND 𝑓𝑐
In this section, we present additional image quality metrics, calcu-
lated between legitimate and malicious frames collected during the
frequency sweep described in Section 6.2.
0.8 0.8
MS-SSIM
MS-SSIM
0.6 0.6
0.2 0.2
50 1000 2000 3000 4000 5000 50 1000 2000 3000 4000 5000
Frequency fc (MHz) Frequency fc (MHz)
Figure 14: Results of the frequency sweep represented in the form of the Multiscale Structural Similarity Index Measure
(MS-SSIM) between the frames captured during normal operation and while an attack signal at the carrier frequency 𝑓 c was
emitted.
0.7 0.9
283MHz
341MHz
L2-Norm
L2-Norm
0.6 0.6
0.5 0.3
50 1000 2000 3000 4000 5000 50 1000 2000 3000 4000 5000
Frequency fc (MHz) Frequency fc (MHz)
Figure 15: Results of the frequency sweep represented in the form of the L2-Norm between the frames captured during normal
operation and while an attack signal at the carrier frequency 𝑓 c was emitted.
0.25
0.8
0.6
UQI
UQI
0.15
0.4 276MHz 341MHz
0.2 0.05
50 1000 2000 3000 4000 5000 50 1000 2000 3000 4000 5000
Frequency fc (MHz) Frequency fc (MHz)
Figure 16: Results of the frequency sweep represented in the form of the Universal Image Quanlity Index (UQI) between the
frames captured during normal operation and while an attack signal at the carrier frequency 𝑓 c was emitted.