Proceedings of the ACM/IEEE 14th International Conference on Cyber-Physical Systems (With CPS-IoT Week 2023) 2023
DOI: 10.1145/3576841.3585930
|View full text |Cite
|
Sign up to set email alerts
|

AVstack: An Open-Source, Reconfigurable Platform for Autonomous Vehicle Development

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…Intuitively, MadRadar attacks achieve a FN outcome by adding clutter in the Range-Doppler response around a specific target, in order to raise the CA-CFAR detection threshold and thus significantly decrease the probability of the actual target being detected. We start with the FP attack signal from (10) that spoofs a false object at the same range and velocity as an actual target. Next, we slightly smear the spoofed signal in the range domain by using a very similar slope ( S ′ ) that is slightly offset (∼0.01 MHz/µs) from the estimated victim slope ( S).…”
Section: False Negative Attacksmentioning
confidence: 99%
See 4 more Smart Citations
“…Intuitively, MadRadar attacks achieve a FN outcome by adding clutter in the Range-Doppler response around a specific target, in order to raise the CA-CFAR detection threshold and thus significantly decrease the probability of the actual target being detected. We start with the FP attack signal from (10) that spoofs a false object at the same range and velocity as an actual target. Next, we slightly smear the spoofed signal in the range domain by using a very similar slope ( S ′ ) that is slightly offset (∼0.01 MHz/µs) from the estimated victim slope ( S).…”
Section: False Negative Attacksmentioning
confidence: 99%
“…The translation attack is achieved by simultaneously transmitting the FP attack from (10) and the FN attack from (11). For the FN attack, we set d spoof and v spoof to the location of an actual target so that it is 'removed' from the victim radar's point cloud.…”
Section: Translation Attackmentioning
confidence: 99%
See 3 more Smart Citations