Proceedings Third International Workshop on Automotive and Autonomous Vehicle Security 2021
DOI: 10.14722/autosec.2021.23007
|View full text |Cite
|
Sign up to set email alerts
|

Spoofing Mobileye 630’s Video Camera Using a Projector

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…Results demonstrated that the misclassification of the altered indicators led to certain unanticipated actions in the car. In a different study [213] that focused on the wellknown Mobileye external ADAS, researchers used drone projections of fake traffic signals to determine how environmental changes-such as those related to projection speed, diameter, color, and ambient light-affected the success of an attack.…”
Section: Ai-based Adversarial Attacks Against Autonomous Vehiclesmentioning
confidence: 99%
“…Results demonstrated that the misclassification of the altered indicators led to certain unanticipated actions in the car. In a different study [213] that focused on the wellknown Mobileye external ADAS, researchers used drone projections of fake traffic signals to determine how environmental changes-such as those related to projection speed, diameter, color, and ambient light-affected the success of an attack.…”
Section: Ai-based Adversarial Attacks Against Autonomous Vehiclesmentioning
confidence: 99%
“…The use of computer vision systems in AVs has become a field of relevance in cybersecurity for its potential impact on the safety of citizen. Almost all perception tasks (e.g., sign and object recognition, localisation or object tracking) performed in AVs are currently based on deep neural network architectures [25,28,29,36,48,52]. All these systems are susceptible to evasion attacks and other vulnerabilities specific to such systems [2,14,47,50].…”
Section: Experimental Evaluation Of the Feasibility Of A Physical Adv...mentioning
confidence: 99%
“…Without this capability, Tesla's autopilot was unintentionally triggered, causing the car to: (1) continuously slam on the brakes in response to a print advertisement containing a picture of a person that appeared on a bus [4], and (2) stop in response to a billboard advertisement that contained a stop sign [5]. Moreover, attackers can exploit the absence of this capability and intentionally trigger: (1) Tesla's autopilot to suddenly stop the car in the middle of a road in response to a stop sign embedded in an advertisement on a digital billboard [2], and (2) Mobileye 630 to issue false notifications regarding a projected road sign [6].…”
Section: Related Workmentioning
confidence: 99%