This document discusses contactless attacks against sensors used in autonomous vehicles. It describes how ultrasonic sensors, millimeter wave radars, and cameras can be attacked using jamming, spoofing, or blinding techniques. Experiments were able to cause parking assistance systems and Tesla's Autopilot to malfunction or behave unexpectedly by attacking ultrasonic and radar sensors. Cameras could be blinded using infrared LEDs or laser pointers. The researchers conclude that sensors need to be designed with security in mind to prevent intentional attacks, and that fully autonomous vehicles will need redundant sensors and data fusion to achieve full security.
An autonomous vehicle is a kind of vehicle which can drive itself to the destination without any human
conduction. This is also known as driverless vehicle, self-driving vehicle or robot vehicle. Autonomous
vehicles require the combination of various sensors to detect their surroundings and interpret the
information to identify the appropriate navigation path and the obstacles in the way.
Modern vehicles provide some autonomous features like speed controls, emergency braking or keeping
the vehicle into the lane. Here, differences remain between a fully autonomous vehicle on one hand
and driver assistance technologies on the other hand.
An autonomous vehicle is a kind of vehicle which can drive itself to the destination without any human
conduction. This is also known as driverless vehicle, self-driving vehicle or robot vehicle. Autonomous
vehicles require the combination of various sensors to detect their surroundings and interpret the
information to identify the appropriate navigation path and the obstacles in the way.
Modern vehicles provide some autonomous features like speed controls, emergency braking or keeping
the vehicle into the lane. Here, differences remain between a fully autonomous vehicle on one hand
and driver assistance technologies on the other hand.
An autonomous vehicle, or a driverless vehicle, is one that is able to operate itself and perform necessary functions without any human intervention, through ability to sense its surroundings.
An autonomous vehicle utilises a fully automated driving system in order to allow the vehicle to respond to external conditions that a human driver would manage.
This is a presentation that focuses on autonomous vehicles technology. The presentation describes key sensor technologies integrated under the bonnet of a driverless car. After a brief introduction, the presentation dwells deeper into each sensor technology demonstrating examples of self driving cars such as Google's self driving car, DARPA URBAN challenge etc., along the way. It also introduces the concept of electronic control units which is responsible for collecting data from different sensors and respond to other units accordingly. The slides also build a platform for vehicle to vehicle communication technology, types and its application areas.
Ultrasonic automatic braking system in cars by Accelerator Disengagement Mech...Arvind Srivastava
The Ultrasonic Automatic Braking System in cars is a safety measure which can be implemented to apply the brakes suddenly in case of collision. Accelerator disengagement mechanism uses a servo motor and an additional link which shuts down the throttle valve to disengage accelerator and then the brakes.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final
1. Can You Trust Autonomous Vehicles:
Contactless Attacks against Sensors of
Self-Driving Vehicles
Jianhao Liu Qihoo360 SKY-GO Team
Chen Yan USSLab, Zhejiang University
Wenyuan Xu Zhejiang University & University of South Carolina
2. Jianhao Liu
Director
Qihoo 360
SKY-GO Vehicle Cyber Security Team
Who Are We
2
Chen Yan
Ph.D. Student
USSLab
Zhejiang University
Wenyuan Xu
Professor
Zhejiang University
University of South Carolina
4. The Car Hacking History
- Car ===> CAN bus hacking
- Connected car ===> Telematics hacking
- Autonomous car ===> Automatic system hacking
4
5. What is Autonomous Vehicle?
5
Source: Michael Aeberhard, BMW Group Research and Technology
6. Levels of Driving Automation
6
SAE J3016
Advanced Driver
Assistance System
(ADAS)
Google
Self-Driving Car
(in experiment)
Tesla
7. Sensors in automated driving system
7Source:Michael Aeberhard, BMW Group Research and Technology
Human-Machine
Interface
V2X
Scenario
Assessment
Driving Function
Sensors
9. Sensors for Self-Driving
9
Source: Texas Instruments
Ultrasonic Sensors
Limited to proximity, low speed manoeuvres.
Cameras
Senses reflected light,
limited when dark.
Sees colour, so can be
used to read signs,
signals, etc.
LiDAR
Emits light, so darkness not an issue. Some
weather limitation.
Radar
Works in low light & poor weather, but lower resolution.
13. Tesla: A Tragic Loss
• First fatal crash while using
Autopilot on May 7, 2016.
• Reliability of sensors.
13
Source: The New York Times
First Tesla Accident in China Caused by Autopilot
14. Existing Sensors on Tesla Model S
14
One camera
A forward looking camera is mounted
on the windshield under the rear view
mirror.
12 ultrasonic sensors
Ultrasonic sensors are located near
the front and rear bumpers.
One MMW Radar
A Medium range Radar is mounted in
the front grill.
22. Misuse 2: The car stops while it shouldn’t.
22
Is it cursed?!
Why the car
can’t park in??
23. How do ultrasonic sensors work?
• Emit ultrasound and receive echoes
• Piezoelectric Effect
• Measure the propagation time (Time of Flight)
• Calculate the distance
23
: propagation time of echoes
: velocity of sound in air
Ultrasonic
Sensor
Distance
Electrical signal
25. Jamming Attack
• Basic Idea:
– Injecting ultrasonic noises
– At resonant frequency (40 – 50 kHz)
– Causing Denial of Service
• Tested ultrasonic sensors:
– In laboratories: 8 models of stand-alone ultrasonic sensors
– Outdoors: Tesla, Audi, Volkswagen, Ford
25
26. Jamming Attack – in lab
• 8 models of ultrasonic sensors
– HC-SR04
– SRF01
– SRF05
– MaxSonar MB1200
– JSN-SR04T
– FreeCars V4
– Grove ultrasonic ranger
– Audi Q3 sensors
• Sensor reading
– Zero distance
– Maximum distance
26
No jamming
Received electrical signals at the sensor
Excitation
pulse
Echo pulses
Weak
Jamming
Noises
Next cycle
Strong
Jamming
Noises
27. How should cars behave
to jamming?
Zero distance?
or
Maximum distance?
27
28. Jamming Attack – on vehicles
• 4 different vehicles
– Audi Q3
– Volkswagen Tiguan
– Ford Fiesta
– Tesla Model S
• Self parking
• Summon
• Results
– Maximum distance
28
Experiment setup on Tesla Model S
30. Jamming Attack – Results
• On ultrasonic sensors
– Zero or maximum distance
• On vehicles with parking assistance
– Maximum distance
• On self-parking and summon?
30
Tesla Normal Tesla Jammed
Audi Normal Audi Jammed
31. Jamming Attack – Demo on Tesla Summon
31
Jamming hides obstacles.
32. Jamming Attack – Demo on Tesla Summon
32
The interferer was hit & stopped working.
Jamming distance can be increased.
33. Jamming Attack – Results
• On ultrasonic sensors
– Zero or maximum distance
• On vehicles with parking assistance
– Maximum distance
• On self-parking and summon
– Car does not stop under strong jamming!
33
Tesla Normal Tesla Jammed
Audi Normal Audi Jammed
34. Why Zero or Max distance?
Different sensor designs
• Zero distance
– Compare with a fixed threshold
• Maximum distance
Application Specific IC!
34
Threshold
35. Why Zero or Max distance?
Different sensor designs
• Zero distance
– Compare with a fixed threshold
• Maximum distance
– Adaptive threshold (Noise Suppression)
35
No jamming
Excitation
pulse
Echo pulses
Time of flight
Weak
Jamming
Increased noise floor
Strong
Jamming
Overwhelmed by noise
36. Spoofing Attack
Basic Idea
• Injecting ultrasonic pulses
• At certain time
Non-trivial
• Only the first justifiable
echo will be processed
• Effective time slot
36
Effective time slot
39. Spoofing Attack – Results
• Manipulate sensor readings
– On stand-alone ultrasonic sensors
– On cars
39
Tesla Normal Tesla Spoofed Audi Spoofed
Parking Aid
40. Acoustic Quieting
• Acoustic Cancellation
– Cancel original sound with
ones of reversed phase
– Minor phase and
amplitude adjustment
• Cloaking
– Sound absorbing materials
(e.g., damping foams ($3/m2))
– Same effect as jamming!
40
45. Millimeter Wave Radar
45
What is MMW Radar?
• Measures distance, angle, speed, shape
• Short to long range sensing (30-250m)
• Applications
– Adaptive Cruise Control (ACC)
– Collision Avoidance
– Blind Spot Detection
46. Misuse 1: The car doesn’t stop while it should.
46
Why doesn’t
the car stop??
Oh NOOO!!!
47. Misuse 2: The car stops while it shouldn’t.
47
NO!
Don’t stop!!!
I’ll catch you!
48. How do MMW Radars work?
• Transmit and receive millimeter electromagnetic waves
• Measure the propagation time
• Modulation
– Amplitude
– Frequency (FMCW)
– Phase
• Doppler Effect
• Frequency Bands:
– 24 GHz
– 76-77 GHz
48
Block diagram of a bistatic Radar with frequency modulation
(Source: H. Winner, Handbook of Driver Assistance Systems)
49. Frequency Modulated Continuous Wave (FMCW)
49
Frequency
Time
Reflection Time
ΔT
Transmitted
signal
t
Received
signal
t+ΔT
Difference Frequency
fd
76.4GHz
76.6GHz
Doppler shift
fd
slope
ΔT =
50. MMW Radar – To be discovered
#1. Understand Radar signal – Signal Analysis
– Frequency range
– Modulation process
– Ramp height (bandwidth)
– Ramps (number, duration)
– Cycle time
#2. Jamming Attack
– Feasible?
– What jamming signal?
#3. Spoofing Attack
– Feasible?
50
The MMW Radar on Tesla Model S
51. Attacking MMW Radar – Setup
• Signal Analysis
• Jamming Attack
• Spoofing Attack
• Equipment:
– Tesla Model S Radar (A)
– Signal analyzer (C)
– Harmonic mixer (E)
– Oscilloscope (B)
– Signal generator (D)
– Frequency multiplier (E)
51
52. MMW Radar Signal Analysis
• Center frequency: 76.65 GHz
• Bandwidth: 450 MHz
• Modulation: FMCW
• Radar chirp details …
52
Harmonic
Mixer
Signal
Analyzer
Oscilloscope
Frequency domain
analysis
Time domain
analysis
Real-time spectrum on signal analyzer
53. Attacks on MMW Radar
Jamming Attack
• Jam Radar within the same frequency band, i.e., 76 - 77 GHz
• At fixed frequency
• At sweeping frequency
53
Frequency
Time
Transmitted
signal
t
Received
signal
t+ΔT
Spoofing Attack
• Spoof the radar with similar RF signal
Frequency
Multiplier
Signal
Generator
12.775 GHz 76.65 GHz
54. What indicates Autopilot?
• What does blue mean?
• Why stationary?
54
Traffic Aware Cruise Control is on. Autosteer is on.
56. Attacking MMW Radars – Results
56
• Jamming: hides detected objects
– Either fixed or sweeping frequency signal worked
• Spoofing: alters object distance
Result of jamming attack
64. Response from Tesla
“... We appreciate the hard work you have put into researching potential attacks on
sensors used in the Autopilot system. We are currently evaluating your report and
investigating the concerns your team has raised so that we can understand if any
real world risks have been uncovered ...”
64
65. Countermeasures
• Sensor fail safe
– Zero or maximum
– Anomaly detection
• Sensor redundancy
– MIMO system
– Different types of sensors
• Sensor data fusion
65
Thank
Goodness!
66. What’s next?
• Read more data in vehicular system
• Moving vehicle experiments
• Obtain range and angle measurement
• Increase attack range
66
67. Conclusions and Takeaway messages
• Attacking existing sensors is feasible
• The sky is not falling
• Sensors should be designed with security in mind
– Think about intentional attacks
• For customers
– Don’t trust semi-autonomous cars yet
Will we have fully secure autonomous cars?
67
68. Acknowledgements
• Tongji University
– Dr. Xin Bi
• Keysight Open Laboratory & Solution Center, Beijing
• Xpwn Team
• USSLab, Zhejiang University
– Weibin Jia, Zhou Zhuang, Guoming Zhang
• ADLAB, AILAB, Qihoo 360
– Bin Guo
– Qiang Chen
68