Groups Outline Cybersecurity Risks For AI In Autonomous Vehicles

Fox Rothschild LLP
Contact

Fox Rothschild LLP

The European Union Agency for Cybersecurity (ENISA) and the Joint Research Centre of the European Commission (JRC) have issued a joint guidance on “Cybersecurity Challenges in the Update of Artificial Intelligence in Autonomous Driving.”

Key Points
  • Because autonomous vehicles use AI for many aspects traditionally handled by human drivers, the classic approach of “securing digital systems” is not sufficient. You must consider AI-specific issues in the context of the full supply chain involved in their development and integration with other automotive systems.
  • AI and Machine Learning are the keystone of highly-accessorized smart cars and will be the key for the next generation cars.
  • The most significant and well-known vulnerabilities and possible attack scenarios on AI models employed in AV’s involve computer vision techniques.
  • A crucial challenge is the right handling of edge cases, where an unknown situation outside of the training data distribution is encountered: e.g. ignoring a stop sign partially covered by snow.

The report analyzes common AI vulnerabilities in autonomous vehicles and recommendations to address them.

Read the full report.

[View source.]

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Fox Rothschild LLP | Attorney Advertising

Written by:

Fox Rothschild LLP
Contact
more
less

Fox Rothschild LLP on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide

This website uses cookies to improve user experience, track anonymous site usage, store authorization tokens and permit sharing on social media networks. By continuing to browse this website you accept the use of cookies. Click here to read more about how we use cookies.