Skip to main content

Hackers can fool self-driving car sensors into evasive action

The laser ranging (LIDAR) systems that most self-driving cars rely on to sense obstacles can be hacked by a setup costing just US$60, a security researcher has told IEEE spectrum. According to Jonathan Petit, principal scientist at software security company Security Innovation, he can take echoes of a fake car, pedestrian or wall and put them in any location. Using such a system, which he designed using a low-power laser and pulse generator, attackers could trick a self-driving car into thinking somethin
September 8, 2015 Read time: 2 mins
The laser ranging (LIDAR) systems that most self-driving cars rely on to sense obstacles can be hacked by a setup costing just US$60, a security researcher has told 6781 IEEE spectrum.

According to Jonathan Petit, principal scientist at software security company Security Innovation, he can take echoes of a fake car, pedestrian or wall and put them in any location. Using such a system, which he designed using a low-power laser and pulse generator, attackers could trick a self-driving car into thinking something is directly ahead of it, forcing it to slow down.

In a paper written while he was a research fellow in the University of Cork’s Computer Security Group and due to be presented at the Black Hat Europe security conference in November, Petit describes the system he built with off the shelf components that can create the illusion of an obstacle anywhere from 20 to 350 metres from the LIDAR unit and make multiple copies of the simulated obstacles, and even make them move.

While the short-range radars used by many self-driving cars for navigation operate in a frequency band requiring licencing, LIDAR systems use easily-mimicked pulses of laser light to build up a 3-D picture of the car’s surroundings and were ripe for attack.

“I can spoof thousands of objects and basically carry out a denial of service attack on the tracking system so it’s not able to track real objects,” Petit told IEEE spectrum. I don’t think any of the LIDAR manufacturers have thought about this or tried this.”

For more information on companies in this article

Related Content

  • The rise of V2X: it’s time for ITS to put up the shields in cyberspace
    May 14, 2018
    Traffic management has largely been shielded from the sort of malicious hacking that is commonplace in other industries – but with billions of connected devices in the world it won’t stay that way, warn internet experts Keith Golden and Brandon Johnson. Traditionally isolated from networks and the internet over most of its history, the traffic management industry has largely been shielded from malicious hacking and system intrusion that have become commonplace in other industries. However, as the rate of
  • ITS America & AASHTO: 5.9 GHz legal action
    June 7, 2021
    Two respected transportation bodies launch appeal against FCC's decision on 5.9 GHz band
  • Sampo Hietanen’s mobility mission
    June 17, 2016
    For a decade Sampo Hietanen harboured a vision of an alternative form of mobility, now as CEO of MaaS Finland he is putting theory into practice. Sampo Hietanen has become the embodiment of Mobility as a Service (MaaS) – a concept he created 10 years ago while working for Finnish civil engineering giant Destia. “I had been working with the mobile sector on traffic information and started thinking what will happen when this becomes bigger,” he says.
  • Car to car communications a step closer
    December 14, 2012
    Vehicle manufacturers have targeted 2015 for the first cars to roll off European assembly lines fitted with operational V2X technology. They and their partners in the Car 2 Car Communications Consortium are confident of meeting the target, reports Jon Masters. Around three years from now vehicles should be appearing in showrooms boasting the capability of communicating with each other. Manufacturers will have started fitting the first proprietary car-to-car driver-aid safety devices and deployment of ‘vehic