Skip to main content

Hackers can fool self-driving car sensors into evasive action

The laser ranging (LIDAR) systems that most self-driving cars rely on to sense obstacles can be hacked by a setup costing just US$60, a security researcher has told IEEE spectrum. According to Jonathan Petit, principal scientist at software security company Security Innovation, he can take echoes of a fake car, pedestrian or wall and put them in any location. Using such a system, which he designed using a low-power laser and pulse generator, attackers could trick a self-driving car into thinking somethin
September 8, 2015 Read time: 2 mins
The laser ranging (LIDAR) systems that most self-driving cars rely on to sense obstacles can be hacked by a setup costing just US$60, a security researcher has told 6781 IEEE spectrum.

According to Jonathan Petit, principal scientist at software security company Security Innovation, he can take echoes of a fake car, pedestrian or wall and put them in any location. Using such a system, which he designed using a low-power laser and pulse generator, attackers could trick a self-driving car into thinking something is directly ahead of it, forcing it to slow down.

In a paper written while he was a research fellow in the University of Cork’s Computer Security Group and due to be presented at the Black Hat Europe security conference in November, Petit describes the system he built with off the shelf components that can create the illusion of an obstacle anywhere from 20 to 350 metres from the LIDAR unit and make multiple copies of the simulated obstacles, and even make them move.

While the short-range radars used by many self-driving cars for navigation operate in a frequency band requiring licencing, LIDAR systems use easily-mimicked pulses of laser light to build up a 3-D picture of the car’s surroundings and were ripe for attack.

“I can spoof thousands of objects and basically carry out a denial of service attack on the tracking system so it’s not able to track real objects,” Petit told IEEE spectrum. I don’t think any of the LIDAR manufacturers have thought about this or tried this.”

For more information on companies in this article

Related Content

  • Vision technology: the future in focus
    November 23, 2018
    Just a few years ago, terms such as ‘embedded’ and ‘polarisation’ were buzzwords. But now they are real and present examples of vision technology in action – and, Adam Hill finds, the ITS industry is waking up to a number of possible applications Every aspect of the intelligent transportation systems industry moves quickly – but developments in camera technology change with a rapidity which can appear quite bewildering. And with ITS providers constantly searching for an edge against fierce competitio
  • Virtual ITS European Congress 2020: report
    November 25, 2020
    ITS industry ‘needs to make a move towards each other’, Congress delegates hear
  • Wireless bridges widen options for ITS upgrades
    December 9, 2014
    Antaira Technologies’ marketing engineer Brian Roth explains why the increasing capacity of wireless bridges is reducing the cost of expanding and upgrading ITS networks. With more than half of the world’s population now living in cities, the need for efficient transportation of both people and goods has never been greater and that pressure is unlikely to ease any time soon. Indeed in many regions of the world the rate of urbanisation is still increasing as the demand for rural workers continues to decline.
  • Use of ITS technology grows more prevalent in safety applications
    January 30, 2012
    Transportation agencies and governments are using ITS technology to protect critical infrastructure from terrorist attack and other threats to economic security and public safety. Andrew Bardin Williams reports. It is no secret that we live in a potentially dangerous world. Terrorism as seen on 9/11 in the United States, subsequent attacks in London, Moscow and Madrid and other acts of violence across the developing world have made vigilance the watchword for ensuring security. Key infrastructure is now bei