Skip to main content

Hackers can fool self-driving car sensors into evasive action

The laser ranging (LIDAR) systems that most self-driving cars rely on to sense obstacles can be hacked by a setup costing just US$60, a security researcher has told IEEE spectrum. According to Jonathan Petit, principal scientist at software security company Security Innovation, he can take echoes of a fake car, pedestrian or wall and put them in any location. Using such a system, which he designed using a low-power laser and pulse generator, attackers could trick a self-driving car into thinking somethin
September 8, 2015 Read time: 2 mins
The laser ranging (LIDAR) systems that most self-driving cars rely on to sense obstacles can be hacked by a setup costing just US$60, a security researcher has told 6781 IEEE spectrum.

According to Jonathan Petit, principal scientist at software security company Security Innovation, he can take echoes of a fake car, pedestrian or wall and put them in any location. Using such a system, which he designed using a low-power laser and pulse generator, attackers could trick a self-driving car into thinking something is directly ahead of it, forcing it to slow down.

In a paper written while he was a research fellow in the University of Cork’s Computer Security Group and due to be presented at the Black Hat Europe security conference in November, Petit describes the system he built with off the shelf components that can create the illusion of an obstacle anywhere from 20 to 350 metres from the LIDAR unit and make multiple copies of the simulated obstacles, and even make them move.

While the short-range radars used by many self-driving cars for navigation operate in a frequency band requiring licencing, LIDAR systems use easily-mimicked pulses of laser light to build up a 3-D picture of the car’s surroundings and were ripe for attack.

“I can spoof thousands of objects and basically carry out a denial of service attack on the tracking system so it’s not able to track real objects,” Petit told IEEE spectrum. I don’t think any of the LIDAR manufacturers have thought about this or tried this.”

Related Content

  • May 10, 2019
    SafeRide: it’s time to act on cyberattacks
    Cyber threats are increasing rapidly and conventional security measures are unable to keep up. Ben Spencer talks to SafeRide’s Gil Reiter about what OEMs can do now As more vehicles become connected, so the potential threats to their security increase. Gil Reiter, vice president of product management for security firm SafeRide, says the biggest ‘attack surface’ for connected cars is their internet connectivity - and the in-vehicle applications that use the internet connection. “The most vulnerable co
  • September 25, 2020
    Destiny Thomas on transit's racist legacy
    The killing of George Floyd by US police sparked international protests and put Black Lives Matter into the spotlight. Dr Destiny Thomas, founder and CEO of Thrivance Group, talks to Adam Hill about the legacy of racism in transit, Covid-19, slow streets – and what comes next
  • May 9, 2022
    BlackBerry warns of hacking danger
    As connected vehicles inch towards becoming a common sight, there are concerns that they are ripe for hacking by malign actors. Alan Dron looks at BlackBerry’s 2022 Threat Report
  • May 26, 2020
    OpenSpace visualises how social distancing will work
    OpenSpace CEO Nicolas Le Glatin tells Adam Hill how Xovis camera tech might help unlock more convenient ways for moving through mobility hubs during Covid-19