2017
DOI: 10.1007/978-3-319-66787-4_22
|View full text |Cite
|
Sign up to set email alerts
|

Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
216
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 168 publications
(217 citation statements)
references
References 11 publications
0
216
0
1
Order By: Relevance
“…Threat model. To achieve the attack goal above, we consider Li-DAR spoofing attacks as our threat model, which is a demonstrated practical attack vector for LiDAR sensors [42,44] as described in §2.2. In AV settings, there are several possible scenarios to perform such attack.…”
Section: Attack Goal and Threat Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…Threat model. To achieve the attack goal above, we consider Li-DAR spoofing attacks as our threat model, which is a demonstrated practical attack vector for LiDAR sensors [42,44] as described in §2.2. In AV settings, there are several possible scenarios to perform such attack.…”
Section: Attack Goal and Threat Modelmentioning
confidence: 99%
“…Another class of defenses aims to reduce the influence of the attack by modifying the internal sensing structure of the LiDAR. Different solutions include reducing the receiving angle and filtering unwanted light spectra to make LiDARs less susceptible to attacks [42,44]. However, these techniques also reduce the capacity of the LiDAR to measure the reflected laser pulses, which limits the range and the sensitivity of the device.…”
Section: Av System-level Defensesmentioning
confidence: 99%
See 2 more Smart Citations
“…To motivate our definition, the term injection was chosen because it captures the fact that values reported by a system are altered; it is not channel-specific; and it has already been adopted by different works [5], [11], [13], [35]- [44]. The out-of-band qualifier is necessary to distinguish the attacks studied in this survey from signal injection attacks on sensors using pulse reflections such as LiDARs [9], [14], [31], signal injection attacks on the physical layer of communication protocols [45], and false data injection attacks [28], [46]. As explained in Section I-A, these attacks are out-of-scope, as they do not depend on hardware vulnerabilities, but instead use external communication interfaces.…”
Section: Choice Of Terminologymentioning
confidence: 99%