Skip to main content

Hackers can fool self-driving car sensors into evasive action

The laser ranging (LIDAR) systems that most self-driving cars rely on to sense obstacles can be hacked by a setup costing just US$60, a security researcher has told IEEE spectrum. According to Jonathan Petit, principal scientist at software security company Security Innovation, he can take echoes of a fake car, pedestrian or wall and put them in any location. Using such a system, which he designed using a low-power laser and pulse generator, attackers could trick a self-driving car into thinking somethin
September 8, 2015 Read time: 2 mins
The laser ranging (LIDAR) systems that most self-driving cars rely on to sense obstacles can be hacked by a setup costing just US$60, a security researcher has told 6781 IEEE spectrum.

According to Jonathan Petit, principal scientist at software security company Security Innovation, he can take echoes of a fake car, pedestrian or wall and put them in any location. Using such a system, which he designed using a low-power laser and pulse generator, attackers could trick a self-driving car into thinking something is directly ahead of it, forcing it to slow down.

In a paper written while he was a research fellow in the University of Cork’s Computer Security Group and due to be presented at the Black Hat Europe security conference in November, Petit describes the system he built with off the shelf components that can create the illusion of an obstacle anywhere from 20 to 350 metres from the LIDAR unit and make multiple copies of the simulated obstacles, and even make them move.

While the short-range radars used by many self-driving cars for navigation operate in a frequency band requiring licencing, LIDAR systems use easily-mimicked pulses of laser light to build up a 3-D picture of the car’s surroundings and were ripe for attack.

“I can spoof thousands of objects and basically carry out a denial of service attack on the tracking system so it’s not able to track real objects,” Petit told IEEE spectrum. I don’t think any of the LIDAR manufacturers have thought about this or tried this.”

For more information on companies in this article

Related Content

  • US and UK Respondents call for stricter data security regulations for Connected Cars
    November 28, 2017
    Over 40% of both 1,000 US and UK adult consumers who took part in a new study feel that the government should apply stricter data security regulations for connected cars (CCs), according to Thales’ E-Security IoT Survey. A combined 60% of both respondents believe that CCs pose security concerns with integrity and malfunctions at the top of the list of apprehensions when asked to identify internet-connected devices which they felt were most vulnerable to hacking.
  • Developing new detection and monitoring technologies
    November 21, 2012
    Established detection and monitoring technologies continue to evolve, but is it time to challenge their supremacy and take a serious look at less conventional ITS? Andy Graham considers the options with Jason Barnes. For ITS system providers, the most potentially lucrative markets over the next few years are going to be the BRIC (Brazil Russia India and China) group of countries, all of which are building many miles of new roads, applying tolling to existing ones (8,000km in China alone) and implementing w
  • Give offending drivers credit for good behaviour
    July 27, 2012
    Andrew Rooke and Dave Marples of Technolution B.V. take a look at what can be done to address a long-standing problem: the all-or-nothing approach of automated enforcement. To start, a brief history of speeding: on 14 November 1896, the first Veteran Car Run was staged in England from London to Brighton. It was organised to celebrate new British legislation to raise the maximum speed of vehicles from four to 14mph while also removing the need for a person waving a red flag to walk in front of the car and wa
  • Volkswagen sues to prevent hacking of luxury car anti-theft systems
    July 31, 2013
    A group of Dutch and British scientists at the UK’s University of Birmingham has discovered the secret algorithm used to identify the identity of each unique ignition key used to start luxury and exotic cars such as Porsches, Lamborghinis, Audis and Bentleys, all part of the German Volkswagen Group. The scientists, Baris Ege, Roel Verdult and Flavio Garcia had hoped to publish the paper at the USENIX Security Conference in Washington next month but Volkswagen sued to prevent them from disclosing key details