Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security 2021
DOI: 10.1145/3474376.3487283
|View full text |Cite
|
Sign up to set email alerts
|

Spoofing Attacks Against Vehicular FMCW Radar

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(16 citation statements)
references
References 21 publications
0
16
0
Order By: Relevance
“…Thus, the receiver is able to distinguish the signals sent by the radar itself, since it uses parameters for which interference from other radars can be detected [23,26]. In [33,35,38], spoofing devices based on a phase-quadrature modulator with an oscillator were proposed. They proposed sending artificial chirp signals to generate ghost responses with the same parameters as the victim radar but without transmitting the signals.…”
Section: System Overview and Theoretical Background Fmcw Radar And Ba...mentioning
confidence: 99%
See 2 more Smart Citations
“…Thus, the receiver is able to distinguish the signals sent by the radar itself, since it uses parameters for which interference from other radars can be detected [23,26]. In [33,35,38], spoofing devices based on a phase-quadrature modulator with an oscillator were proposed. They proposed sending artificial chirp signals to generate ghost responses with the same parameters as the victim radar but without transmitting the signals.…”
Section: System Overview and Theoretical Background Fmcw Radar And Ba...mentioning
confidence: 99%
“…In [ 33 , 35 , 38 ], spoofing devices based on a phase-quadrature modulator with an oscillator were proposed. They proposed sending artificial chirp signals to generate ghost responses with the same parameters as the victim radar but without transmitting the signals.…”
Section: System Overview and Theoretical Backgroundmentioning
confidence: 99%
See 1 more Smart Citation
“…Due to the increased complexity of radar sensors (as compared to LiDAR and camera systems), however, only partial success has been demonstrated in constrained, simulated environments [8,9]. We begin with the analysis of the synchronized adversary due to its familiarity and simplicity.…”
Section: Baseline Scenario: Synchronized Adversarymentioning
confidence: 99%
“…The complex nature of radar's hardware-physical level, e.g., use of highfrequency signals, specialized hardware, fast internal clocks, and protections against signal-noise, have made adversarial interference difficult. So far, only partial success has been shown in constrained environments [8][9][10], with the majority of research being focused on potential, mostly theoretical, countermeasures [11,12]. This is also noted in [10], which mentions that deploying spoofing attacks against commercial automotive radars operating in the mmWave frequency range, poses significant difficulties when compared to evaluations conducted in simulated or constrained wired setups.…”
Section: Introductionmentioning
confidence: 99%