Security Researcher Hacks Self Driving Car Sensors Using Laser Single

13.44
Security Researcher Hacks Self Driving Car Sensors Using Laser Single -

senior researcher at the security innovation, Jonathan Little, will present a paper on how to deceive Lidar sensors that are normally found in self driving cars at the Black Hat security conference in Europe in November 2015 as reported in IEEE Spectrum. He said he was able to fool the sensor into seeing things that are not really there use low power laser and pulse generator. Light Detection and Ranging (Lidar) is actually the radar as the system using pulsed lasers to create a 3D image of the world. It is basically the eye of a car driven car.

It can be done by recording the pulses from an off-the-shelf Lidar, a Lux Ibeo and played back by a laser and a pulse generator, which makes Lux view things that are not there. It works less than 100 meters away and can be performed from the front, rear and side of the unit Lux.

The attack would cause a car driving to slow down or drive erratically or might even overwhelmed the system, creating a denial-of-service attack that eventually cause the car to stop moving completely. The attack is working only on Ibeo Lux and Lux ​​does not mean that is wrong, but Little thought maybe the companies that build lidar units have not thought about the possibility of the attack.

Petit was based at University College Cork, Ireland when he made this experience.

Previous
Next Post »
0 Komentar