CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning
January 11, 2019 ยท Entered Twilight ยท ๐ USENIX Security Symposium
"Last commit was 5.0 years ago (โฅ5 year threshold)"
Evidence collected by the PWNC Scanner
Repo contents: .gitignore, 1A_build_injector_trainset.py, 1B_build_remover_trainset.py, 2A_train_injector.py, 2B_train_remover.py, 3A_inject_evidence.py, 3B_remove evidence.py, GUI.py, LICENSE, README.md, config.py, procedures, readme, tamper.py, utils
Authors
Yisroel Mirsky, Tom Mahler, Ilan Shelef, Yuval Elovici
arXiv ID
1901.03597
Category
cs.CR: Cryptography & Security
Cross-listed
cs.CV,
cs.LG
Citations
213
Venue
USENIX Security Symposium
Repository
https://github.com/ymirsky/CT-GAN
โญ 108
Last Checked
2 months ago
Abstract
In 2018, clinics and hospitals were hit with numerous attacks leading to significant data breaches and interruptions in medical services. An attacker with access to medical records can do much more than hold the data for ransom or sell it on the black market. In this paper, we show how an attacker can use deep-learning to add or remove evidence of medical conditions from volumetric (3D) medical scans. An attacker may perform this act in order to stop a political candidate, sabotage research, commit insurance fraud, perform an act of terrorism, or even commit murder. We implement the attack using a 3D conditional GAN and show how the framework (CT-GAN) can be automated. Although the body is complex and 3D medical scans are very large, CT-GAN achieves realistic results which can be executed in milliseconds. To evaluate the attack, we focused on injecting and removing lung cancer from CT scans. We show how three expert radiologists and a state-of-the-art deep learning AI are highly susceptible to the attack. We also explore the attack surface of a modern radiology network and demonstrate one attack vector: we intercepted and manipulated CT scans in an active hospital network with a covert penetration test. Demo video: https://youtu.be/_mkRAArj-x0 Source code: https://github.com/ymirsky/CT-GAN
Community Contributions
Found the code? Know the venue? Think something is wrong? Let us know!
๐ Similar Papers
In the same crypt โ Cryptography & Security
R.I.P.
๐ป
Ghosted
R.I.P.
๐ป
Ghosted
Membership Inference Attacks against Machine Learning Models
R.I.P.
๐ป
Ghosted
The Limitations of Deep Learning in Adversarial Settings
R.I.P.
๐ป
Ghosted
Practical Black-Box Attacks against Machine Learning
R.I.P.
๐ป
Ghosted
Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks
R.I.P.
๐ป
Ghosted