Skip to main content

2017 | OriginalPaper | Buchkapitel

Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications

verfasst von : Hocheol Shin, Dohyun Kim, Yujin Kwon, Yongdae Kim

Erschienen in: Cryptographic Hardware and Embedded Systems – CHES 2017

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the advancement in computing, sensing, and vehicle electronics, autonomous vehicles are being realized. For autonomous driving, environment perception sensors such as radars, lidars, and vision sensors play core roles as the eyes of a vehicle; therefore, their reliability cannot be compromised. In this work, we present a spoofing by relaying attack, which can not only induce illusions in the lidar output but can also cause the illusions to appear closer than the location of a spoofing device. In a recent work, the former attack is shown to be effective, but the latter one was never shown. Additionally, we present a novel saturation attack against lidars, which can completely incapacitate a lidar from sensing a certain direction. The effectiveness of both the approaches is experimentally verified against Velodyne’s VLP-16.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
\(2 \cdot 100 / 3\mathrm {e}8~[\text {s}]\times 360 \cdot 20~[^\circ /\text {s}]\). Note that 20 Hz is the maximum update rate of VLP-16.
 
2
However, we could not find any function alerting the occurrence of saturation.
 
3
Raw packet captures for 10 Hz & 0.2\(^\circ \) can also be found in the appendices.
 
4
Its detailed circuit diagram is given in the appendices.
 
5
This is considerably smaller than the case in Fig. 8. The differences in the light source strength and beam diameter may be the cause.
 
6
As we fired attacking pulses for every two target lidar pulses, \(10 \cdot 2 \cdot 0.1^\circ = 2.0^\circ \). Note that \(0.1^\circ \) was the horizontal resolution of VLP-16 then.
 
Literatur
5.
Zurück zum Zitat Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: Proceedings of 20th USENIX Security Symposium. USENIX Association (2011) Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: Proceedings of 20th USENIX Security Symposium. USENIX Association (2011)
6.
Zurück zum Zitat Cho, K.T., Shin, K.G.: Fingerprinting electronic control units for vehicle intrusion detection. In: Proceedings of 25th USENIX Security Symposium, pp. 911–927. USENIX Association (2016) Cho, K.T., Shin, K.G.: Fingerprinting electronic control units for vehicle intrusion detection. In: Proceedings of 25th USENIX Security Symposium, pp. 911–927. USENIX Association (2016)
7.
Zurück zum Zitat Dagan, T., Wool, A.: Parrot, a software-only anti-spoofing defense system for the can bus. In: ESCAR EUROPE (2016) Dagan, T., Wool, A.: Parrot, a software-only anti-spoofing defense system for the can bus. In: ESCAR EUROPE (2016)
8.
Zurück zum Zitat Distner, M., Bengtsson, M., Broberg, T., Jakobsson, L.: City safety a system addressing rear-end collisions at low speeds. In: Proceedings of the 21st International Technical Conference on the Enhanced Safety of Vehicles (2009) Distner, M., Bengtsson, M., Broberg, T., Jakobsson, L.: City safety a system addressing rear-end collisions at low speeds. In: Proceedings of the 21st International Technical Conference on the Enhanced Safety of Vehicles (2009)
9.
Zurück zum Zitat Kune, D.F., Backes, J., Clark, S., Kramer, D., Reynolds, M., Fu, K., Kim, Y., Xu, W.: Ghost talk: Mitigating EMI signal injection attacks against analog sensors. In: IEEE Symposium on Security and Privacy. IEEE (2013) Kune, D.F., Backes, J., Clark, S., Kramer, D., Reynolds, M., Fu, K., Kim, Y., Xu, W.: Ghost talk: Mitigating EMI signal injection attacks against analog sensors. In: IEEE Symposium on Security and Privacy. IEEE (2013)
11.
Zurück zum Zitat Goyer, G., Watson, R.: The laser and its application to meteorology. Bull. Am. Meteorol. Soc. 44(9), 564–575 (1963) Goyer, G., Watson, R.: The laser and its application to meteorology. Bull. Am. Meteorol. Soc. 44(9), 564–575 (1963)
13.
Zurück zum Zitat Hoppe, T., Kiltz, S., Dittmann, J.: Security threats to automotive CAN networks – Practical examples and selected short-term countermeasures. In: Harrison, M.D., Sujan, M.-A. (eds.) SAFECOMP 2008. LNCS, vol. 5219, pp. 235–248. Springer, Heidelberg (2008). doi:10.1007/978-3-540-87698-4_21 CrossRef Hoppe, T., Kiltz, S., Dittmann, J.: Security threats to automotive CAN networks – Practical examples and selected short-term countermeasures. In: Harrison, M.D., Sujan, M.-A. (eds.) SAFECOMP 2008. LNCS, vol. 5219, pp. 235–248. Springer, Heidelberg (2008). doi:10.​1007/​978-3-540-87698-4_​21 CrossRef
15.
Zurück zum Zitat Ivanov, R., Pajic, M., Lee, I.: Attack-resilient sensor fusion for safety-critical cyber-physical systems. ACM Trans. Embed. Comput. Syst. 15(1), 21 (2016)CrossRef Ivanov, R., Pajic, M., Lee, I.: Attack-resilient sensor fusion for safety-critical cyber-physical systems. ACM Trans. Embed. Comput. Syst. 15(1), 21 (2016)CrossRef
16.
Zurück zum Zitat Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., et al.: Experimental security analysis of a modern automobile. In: IEEE Symposium on Security and Privacy, pp. 447–462. IEEE (2010) Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., et al.: Experimental security analysis of a modern automobile. In: IEEE Symposium on Security and Privacy, pp. 447–462. IEEE (2010)
18.
Zurück zum Zitat Miller, C., Valasek, C.: Adventures in automotive networks and control units. In: DEF CON 21 (2013) Miller, C., Valasek, C.: Adventures in automotive networks and control units. In: DEF CON 21 (2013)
19.
Zurück zum Zitat Miller, C., Valasek, C.: A survey of remote automotive attack surfaces. In: Black Hat USA (2014) Miller, C., Valasek, C.: A survey of remote automotive attack surfaces. In: Black Hat USA (2014)
20.
Zurück zum Zitat Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. In: Black Hat USA (2015) Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. In: Black Hat USA (2015)
21.
Zurück zum Zitat Montgomery, P.Y., Humphreys, T.E., Ledvina, B.M.: Receiver-autonomous spoofing detection: experimental results of a multi-antenna receiver defense against a portable civil GPS spoofer. In: Proceedings of the ION International Technical Meeting (2009) Montgomery, P.Y., Humphreys, T.E., Ledvina, B.M.: Receiver-autonomous spoofing detection: experimental results of a multi-antenna receiver defense against a portable civil GPS spoofer. In: Proceedings of the ION International Technical Meeting (2009)
22.
Zurück zum Zitat Müter, M., Asaj, N.: Entropy-based anomaly detection for in-vehicle networks. In: IEEE Intelligent Vehicles Symposium, pp. 1110–1115. IEEE (2011) Müter, M., Asaj, N.: Entropy-based anomaly detection for in-vehicle networks. In: IEEE Intelligent Vehicles Symposium, pp. 1110–1115. IEEE (2011)
26.
Zurück zum Zitat Pace, P.E.: Detecting and Classifying Low Probability of Intercept Radar. Artech House, Boston (2009) Pace, P.E.: Detecting and Classifying Low Probability of Intercept Radar. Artech House, Boston (2009)
28.
Zurück zum Zitat Park, J., Ivanov, R., Weimer, J., Pajic, M., Lee, I.: Sensor attack detection in the presence of transient faults. In: Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems (2015) Park, J., Ivanov, R., Weimer, J., Pajic, M., Lee, I.: Sensor attack detection in the presence of transient faults. In: Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems (2015)
29.
Zurück zum Zitat Park, Y., Son, Y., Shin, H., Kim, D., Kim, Y.: This ain’t your dose: Sensor spoofing attack on medical infusion pump. In: 10th USENIX Workshop on Offensive Technologies. USENIX Association (2016) Park, Y., Son, Y., Shin, H., Kim, D., Kim, Y.: This ain’t your dose: Sensor spoofing attack on medical infusion pump. In: 10th USENIX Workshop on Offensive Technologies. USENIX Association (2016)
30.
Zurück zum Zitat Petit, J., Stottelaar, B., Feiri, M., Kargl, F.: Remote attacks on automated vehicles sensors: experiments on camera and LiDAR. In: Black Hat Europe (2015) Petit, J., Stottelaar, B., Feiri, M., Kargl, F.: Remote attacks on automated vehicles sensors: experiments on camera and LiDAR. In: Black Hat Europe (2015)
31.
Zurück zum Zitat Pomerleau, D.A.: ALVINN, an autonomous land vehicle in a neural network. Carnegie Mellon University, Computer Science Department, Technical report (1989) Pomerleau, D.A.: ALVINN, an autonomous land vehicle in a neural network. Carnegie Mellon University, Computer Science Department, Technical report (1989)
34.
Zurück zum Zitat Shin, H., Son, Y., Park, Y., Kwon, Y., Kim, Y.: Sampling race: Bypassing timing-based analog active sensor spoofing detection on analog-digital systems. In: 10th USENIX Workshop on Offensive Technologies. USENIX Association (2016) Shin, H., Son, Y., Park, Y., Kwon, Y., Kim, Y.: Sampling race: Bypassing timing-based analog active sensor spoofing detection on analog-digital systems. In: 10th USENIX Workshop on Offensive Technologies. USENIX Association (2016)
35.
Zurück zum Zitat Shoukry, Y., Martin, P., Tabuada, P., Srivastava, M.: Non-invasive spoofing attacks for anti-lock braking systems. In: Bertoni, G., Coron, J.-S. (eds.) CHES 2013. LNCS, vol. 8086, pp. 55–72. Springer, Heidelberg (2013). doi:10.1007/978-3-642-40349-1_4 CrossRef Shoukry, Y., Martin, P., Tabuada, P., Srivastava, M.: Non-invasive spoofing attacks for anti-lock braking systems. In: Bertoni, G., Coron, J.-S. (eds.) CHES 2013. LNCS, vol. 8086, pp. 55–72. Springer, Heidelberg (2013). doi:10.​1007/​978-3-642-40349-1_​4 CrossRef
36.
Zurück zum Zitat Shoukry, Y., Martin, P., Yona, Y., Diggavi, S., Srivastava, M.: PyCRA: Physical challenge-response authentication for active sensors under spoofing attacks. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1004–1015. ACM (2015) Shoukry, Y., Martin, P., Yona, Y., Diggavi, S., Srivastava, M.: PyCRA: Physical challenge-response authentication for active sensors under spoofing attacks. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1004–1015. ACM (2015)
37.
Zurück zum Zitat Son, Y., Shin, H., Kim, D., Park, Y., Noh, J., Choi, K., Choi, J., Kim, Y.: Rocking drones with intentional sound noise on gyroscopic sensors. In: Proceedings of 24th USENIX Security Symposium, pp. 881–896. USENIX Association (2015) Son, Y., Shin, H., Kim, D., Park, Y., Noh, J., Choi, K., Choi, J., Kim, Y.: Rocking drones with intentional sound noise on gyroscopic sensors. In: Proceedings of 24th USENIX Security Symposium, pp. 881–896. USENIX Association (2015)
38.
Zurück zum Zitat Trippel, T., Weisse, O., Xu, W., Honeyman, P., Fu, K.: WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks. In: IEEE European Symposium on Security and Privacy. IEEE (2017) Trippel, T., Weisse, O., Xu, W., Honeyman, P., Fu, K.: WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks. In: IEEE European Symposium on Security and Privacy. IEEE (2017)
41.
Zurück zum Zitat Van Herrewege, A., Singelee, D., Verbauwhede, I.: CANAuth - A simple, backward compatible broadcast authentication protocol for CAN bus. In: ECRYPT Workshop on Lightweight Cryptography (2011) Van Herrewege, A., Singelee, D., Verbauwhede, I.: CANAuth - A simple, backward compatible broadcast authentication protocol for CAN bus. In: ECRYPT Workshop on Lightweight Cryptography (2011)
43.
Zurück zum Zitat Vosselman, G., Maas, H.G.: Airborne and Terrestrial Laser Scanning. Whittles Publishing, Dunbeath (2010) Vosselman, G., Maas, H.G.: Airborne and Terrestrial Laser Scanning. Whittles Publishing, Dunbeath (2010)
44.
Zurück zum Zitat Yan, C., Xu, W., Liu, J.: Can you trust autonomous vehicles: contactless attacks against sensors of self-driving vehicle. In: DEF CON 24 (2016) Yan, C., Xu, W., Liu, J.: Can you trust autonomous vehicles: contactless attacks against sensors of self-driving vehicle. In: DEF CON 24 (2016)
Metadaten
Titel
Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications
verfasst von
Hocheol Shin
Dohyun Kim
Yujin Kwon
Yongdae Kim
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-66787-4_22