Skip to main content

Hackers can fool self-driving car sensors into evasive action

The laser ranging (LIDAR) systems that most self-driving cars rely on to sense obstacles can be hacked by a setup costing just US$60, a security researcher has told IEEE spectrum. According to Jonathan Petit, principal scientist at software security company Security Innovation, he can take echoes of a fake car, pedestrian or wall and put them in any location. Using such a system, which he designed using a low-power laser and pulse generator, attackers could trick a self-driving car into thinking somethin
September 8, 2015 Read time: 2 mins
The laser ranging (LIDAR) systems that most self-driving cars rely on to sense obstacles can be hacked by a setup costing just US$60, a security researcher has told 6781 IEEE spectrum.

According to Jonathan Petit, principal scientist at software security company Security Innovation, he can take echoes of a fake car, pedestrian or wall and put them in any location. Using such a system, which he designed using a low-power laser and pulse generator, attackers could trick a self-driving car into thinking something is directly ahead of it, forcing it to slow down.

In a paper written while he was a research fellow in the University of Cork’s Computer Security Group and due to be presented at the Black Hat Europe security conference in November, Petit describes the system he built with off the shelf components that can create the illusion of an obstacle anywhere from 20 to 350 metres from the LIDAR unit and make multiple copies of the simulated obstacles, and even make them move.

While the short-range radars used by many self-driving cars for navigation operate in a frequency band requiring licencing, LIDAR systems use easily-mimicked pulses of laser light to build up a 3-D picture of the car’s surroundings and were ripe for attack.

“I can spoof thousands of objects and basically carry out a denial of service attack on the tracking system so it’s not able to track real objects,” Petit told IEEE spectrum. I don’t think any of the LIDAR manufacturers have thought about this or tried this.”

Related Content

  • June 8, 2015
    ITS benefits escape public
    John Kendall considers the public’s awareness of the benefits of ITS. While the results of developing ITS technology may be clear to readers of ITS International, there is far less evidence that drivers have any appreciation of what the technology is doing for them. So how aware are drivers of the developments that are designed to make their journeys less congested and safer?
  • October 28, 2016
    New solutions for catching texting drivers
    Many countries have laws prohibiting texting while driving but enforcement is proving difficult – David Crawford looks at some new approaches being tried by authorities. Finding definitive solutions – technological, regulatory and educational - to the potentially lethal practice of people driving while using mobile phones is proving elusive, while the stakes grow higher.
  • March 17, 2017
    Europe’s road safety gains have stagnated EU
    Europe will fail to meet its road death targets as enforcement budgets are slashed and drivers face an epidemic of distractions. The European Union will not achieve its aim of halving the number of people killed on its roads each year by 2020, delegates to Tispol’s (the organisation of European traffic police) annual conference in Manchester were told. “The target will be missed because there was only a 17% decrease in road fatalities across Europe between 2010 and 2015 when [the rate of reduction] should h
  • January 7, 2013
    Need for secure approach to connected vehicle technology
    Accidental or malicious issue of false messages to connected vehicles could result in dire consequences, so secure systems of authentication and certification are likely to be necessary, write Paul Avery and Sandra Dykes. Connectivity among vehicles in urban traffic systems will provide opportunity for beneficial impacts such as congestion reduction and greater safety. However, it also creates security risks with the potential for targeted disruption. Security algorithms, protocols and procedures must take