Skip to main content

Hackers can fool self-driving car sensors into evasive action

The laser ranging (LIDAR) systems that most self-driving cars rely on to sense obstacles can be hacked by a setup costing just US$60, a security researcher has told IEEE spectrum. According to Jonathan Petit, principal scientist at software security company Security Innovation, he can take echoes of a fake car, pedestrian or wall and put them in any location. Using such a system, which he designed using a low-power laser and pulse generator, attackers could trick a self-driving car into thinking somethin
September 8, 2015 Read time: 2 mins
The laser ranging (LIDAR) systems that most self-driving cars rely on to sense obstacles can be hacked by a setup costing just US$60, a security researcher has told 6781 IEEE spectrum.

According to Jonathan Petit, principal scientist at software security company Security Innovation, he can take echoes of a fake car, pedestrian or wall and put them in any location. Using such a system, which he designed using a low-power laser and pulse generator, attackers could trick a self-driving car into thinking something is directly ahead of it, forcing it to slow down.

In a paper written while he was a research fellow in the University of Cork’s Computer Security Group and due to be presented at the Black Hat Europe security conference in November, Petit describes the system he built with off the shelf components that can create the illusion of an obstacle anywhere from 20 to 350 metres from the LIDAR unit and make multiple copies of the simulated obstacles, and even make them move.

While the short-range radars used by many self-driving cars for navigation operate in a frequency band requiring licencing, LIDAR systems use easily-mimicked pulses of laser light to build up a 3-D picture of the car’s surroundings and were ripe for attack.

“I can spoof thousands of objects and basically carry out a denial of service attack on the tracking system so it’s not able to track real objects,” Petit told IEEE spectrum. I don’t think any of the LIDAR manufacturers have thought about this or tried this.”

For more information on companies in this article

Related Content

  • Wireless traffic data in real time
    January 31, 2012
    The effect of moving objects on the electromagnetic landscape set up by cellular telephony networks can be detected and interpreted to give real-time traffic data across large geographical areas at low cost. Here, we revisit the Celldar concept. Global economic downturn has pushed public-sector agencies, transport administrations among them, to push even harder for cost efficiencies. Unfortunately, when it comes to transport safety and efficiency the public sector often has to work up to a cost rather than
  • What can we do as transport professionals to help save the world?! (Or at least try)
    January 18, 2024
    Does ChatGPT have an answer to this question? Yes. Is it the right one? Well, not exactly. What we really need is for transport to support the type of society we want, says Glenn Lyons. And you, as an individual, can make a difference...
  • Carlos Moreno: ‘I’ve had a lot of death threats over 15-minute cities’
    May 4, 2023
    Carlos Moreno, inventor of the 15-minute city concept, talks to Adam Hill about misinformation, conspiracy theories and the attraction of ‘human smart cities’
  • Technologies to protect connected cars ‘not being utilised’
    August 10, 2016
    A three-year study by IOActive’s Cybersecurity Division has found half of vehicle vulnerabilities could allow cyber attackers to take control of a vehicle - and 71 per cent are ‘easy to exploit’. The research, detailed in a whitepaper, Commonalities in Vehicle Vulnerabilities, is based on real-world security assessments. Technologies which could be exploited include cellular radio, Bluetooth, wi-fi, companion apps, vehicle to vehicle (V2V) radio, onboard diagnostic equipment, infotainment media and Zigbe