Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop 2019
DOI: 10.1145/3338508.3359567
|View full text |Cite
|
Sign up to set email alerts
|

A Low-Cost Replica-Based Distance-Spoofing Attack on mmWave FMCW Radar

Abstract: This paper presents a low-cost distance-spoofing attack on a mmWave Frequency Modulated Continuous Wave (FMCW) radar. It uses only a replica radar chipset and a single compact microcontroller board both in mass production. No expensive and bulky test instrument is required, and hence a low-cost and lightweight attack setup is developed. Even with the limited hardware resource in this setup, the replica radar can be precisely synchronized with the target radar for distance-spoofing capability. A half-chirp modu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(16 citation statements)
references
References 3 publications
(3 reference statements)
0
16
0
Order By: Relevance
“…Due to the fact that the mmWave radar is crucial in bad weather conditions, an attack to fool its measured distance is a critical physical security threat [7], [20]. Specifically, a distance-only spoofing attack [16], [18] was presented on a mmWave Frequency Modulated Continuous Wave (FMCW) radar. The system used a weak Arduino platform against an FMCW radar which used the less-common triangular waveform.…”
Section: B Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Due to the fact that the mmWave radar is crucial in bad weather conditions, an attack to fool its measured distance is a critical physical security threat [7], [20]. Specifically, a distance-only spoofing attack [16], [18] was presented on a mmWave Frequency Modulated Continuous Wave (FMCW) radar. The system used a weak Arduino platform against an FMCW radar which used the less-common triangular waveform.…”
Section: B Related Workmentioning
confidence: 99%
“…However, beyond measuring range, FMCW radars are typically used to measure velocity, which they can achieve with high precision [5]. The attack method in [16] does not spoof the velocity measured by the victim at all.…”
Section: B Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Given that the technical standards of the conventional FMCW system (modulation type, carrier frequency, bandwidth, and pulse period) are known, the attacker can synchronize with the victim radar. [20] recently demonstrates that the distance-spoofing attack on FMCW is feasible with low-cost off-the-shelf hardware. In the second model, two or more radars with identical parameters interfere with each other.…”
Section: B Adversary Modelsmentioning
confidence: 99%
“…Spoofing attack is known as one of the most likely types of attack [3] owing to its simplicity of execution. An attacker only needs to listen to a signal to spoof and re-generate after any intended modification [4] [5]. Several prior attempts have appeared to address the issues of interference and spoofing attack.…”
Section: Introductionmentioning
confidence: 99%