论文标题

毫米波汽车雷达欺骗

Millimeter-Wave Automotive Radar Spoofing

论文作者

Ordean, Mihai, Garcia, Flavio D.

论文摘要

毫米波雷达系统是现代车辆安全至关重要的高级驾驶员助理系统(ADA)的核心组成部分之一。由于天气不良,能够有效地操作能力,因此它们通常是汽车必须检测和评估周围环境中潜在危险的唯一可靠的传感器。在本文中,我们提出了针对汽车雷达的几次攻击,目的是在现实世界中评估它们的可靠性。使用COTS硬件,我们能够成功干扰在现实世界中部署在真正的无线环境中的常用的77GHz频带中运行的汽车级FMCW雷达。我们最强的干扰类型能够欺骗受害者检测虚拟(移动)对象。我们还使用一种新的方法扩展了这种攻击,该方法利用噪声去除现实世界对象,从而补充上述对象欺骗攻击。我们通过两种方式评估攻击的生存能力。首先,我们通过实施和评估不切实际的强大对手来建立基线,该对手需要在使用基于电线的CHIRP同步的有限设置中与受害者同步。后来,我们首次实施了真正的无线攻击,该攻击评估了一个较弱但现实的对手,该攻击是非同步的,并且不需要受害者的任何调整反馈。最后,我们为我们的发现提供了理论基础,并讨论了针对拟议攻击的潜在对策的效率。我们计划将我们的软件作为开源。

Millimeter-wave radar systems are one of the core components of the safety-critical Advanced Driver Assistant System (ADAS) of a modern vehicle. Due to their ability to operate efficiently despite bad weather conditions and poor visibility, they are often the only reliable sensor a car has to detect and evaluate potential dangers in the surrounding environment. In this paper, we propose several attacks against automotive radars for the purposes of assessing their reliability in real-world scenarios. Using COTS hardware, we are able to successfully interfere with automotive-grade FMCW radars operating in the commonly used 77GHz frequency band, deployed in real-world, truly wireless environments. Our strongest type of interference is able to trick the victim into detecting virtual (moving) objects. We also extend this attack with a novel method that leverages noise to remove real-world objects, thus complementing the aforementioned object spoofing attack. We evaluate the viability of our attacks in two ways. First, we establish a baseline by implementing and evaluating an unrealistically powerful adversary which requires synchronization to the victim in a limited setup that uses wire-based chirp synchronization. Later, we implement, for the first time, a truly wireless attack that evaluates a weaker but realistic adversary which is non-synchronized and does not require any adjustment feedback from the victim. Finally, we provide theoretical fundamentals for our findings, and discuss the efficiency of potential countermeasures against the proposed attacks. We plan to release our software as open-source.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源