{"id":180166,"date":"2020-02-20T14:55:42","date_gmt":"2020-02-20T14:55:42","guid":{"rendered":"https:\/\/bm.dev.synology.me\/?p=180166"},"modified":"2020-02-20T14:55:42","modified_gmt":"2020-02-20T14:55:42","slug":"masinile-autonome-pot-fi-deturnate-prin-atacarea-sistemului-de-inteligenta-artificiala","status":"publish","type":"post","link":"https:\/\/bm.dev.synology.me\/?p=180166","title":{"rendered":"Ma\u015finile autonome pot fi deturnate prin atacarea sistemului de inteligen\u0163\u0103 artificial\u0103"},"content":{"rendered":"<p>\nMa\u015finile autonome ar putea fi deturnate prin atacarea sistemului de inteligen\u0163\u0103 artificial\u0103 (IA) care le alimenteaz\u0103, arat\u0103 un studiu McAfee, citat de TechRadar. O ma\u015fin\u0103 Tesla a fost p\u0103c\u0103lit\u0103 s\u0103 accelereze automat la o vitez\u0103 de peste 100 km\/or\u0103.<\/p>\n<p>\nProcesul, pe care McAfee \u00eel nume\u015fte \u201emodel hacking&#8221;, este capabil s\u0103 deturneze complet sistemele de software din anumite autovehicule care pot fi cump\u0103rate \u015fi ast\u0103zi.<\/p>\n<p>\nManipularea algoritmilor ce stau la baza sistemului de inteligen\u0163\u0103 artificial\u0103 al ma\u015finilor poate s\u0103 pun\u0103 \u00een grav pericol siguran\u0163a pasagerilor \u015fi a altor persoane, dar \u015fi viitorul dezvolt\u0103rii ma\u015finilor inteligente.<\/p>\n<p>\nEchipele de Cercetare \u015fi analiz\u0103 avansat\u0103 de la McAfee au folosit \u201emodific\u0103ri minuscule&#8221; pentru a recrea un atac asupra sistemului de camere Mobileye EyeQ3 g\u0103sit \u00een multe vehicule moderne, inclusiv \u00een anumite modele Tesla.<\/p>\n<p>\nAtacul simulat le-a permis cercet\u0103torilor s\u0103 manipuleze sistemul software al unei ma\u015fini Tesla Model S care a fost p\u0103c\u0103lit\u0103 \u00een a citi gre\u015fit un semn de limitare a vitezei \u015fi s\u0103 accelereze automat la o vitez\u0103 de peste 100 km\/or\u0103.<\/p>\n<p>\n\u201eDoar prin schimbarea maginitudinii c\u00e2torva func\u0163ii, cum ar fi pixelii pentru imagini, schimbarea c\u00e2torva zerouri sau eliminarea c\u00e2torva caracteristici, atacatorul poate produce ravagii \u00een opera\u0163iunile de securitate, cu efecte dezastruoase\u201d, spun cercet\u0103torii McAfee Steve Povolny \u015fi Celeste Fralick, \u00eentr-o postare pe blog \u00een care descriu atacul simulat.<\/p>\n<p>\nMcAfee spune c\u0103 nu exist\u0103 atacuri reale, documentate, care s\u0103 fi avut loc p\u00e2n\u0103 \u00een prezent, \u00eens\u0103 interesul cu privire la subiect a \u00eenceput s\u0103 creasc\u0103 \u00een lumea cercet\u0103torilor. Asta \u00eenseamn\u0103 c\u0103 \u015fi interesul atacatorilor ar putea s\u0103 creasc\u0103 pe viitor, mai ales c\u0103 num\u0103rul ma\u015finilor autonome care circul\u0103 pe str\u0103zile din \u00eentreaga lume este a\u015fteptat s\u0103 ajung\u0103 la 750.000 \u00een termen de doar trei ani.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ma\u015finile autonome ar putea fi deturnate prin atacarea sistemului de inteligen\u0163\u0103 artificial\u0103 (IA) care le alimenteaz\u0103, arat\u0103 un studiu McAfee, citat de TechRadar. O ma\u015fin\u0103 Tesla a fost p\u0103c\u0103lit\u0103 s\u0103 accelereze automat la o vitez\u0103 de peste 100 km\/or\u0103. Procesul, pe care McAfee \u00eel nume\u015fte \u201emodel hacking&#8221;, este capabil s\u0103 deturneze complet sistemele de software [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[510],"tags":[10653,25316],"class_list":["post-180166","post","type-post","status-publish","format-standard","hentry","category-actualitate","tag-atac","tag-inteligenta-artificiala"],"_links":{"self":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/180166","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=180166"}],"version-history":[{"count":0,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/180166\/revisions"}],"wp:attachment":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=180166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=180166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=180166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}