2021
DOI: 10.1109/tifs.2021.3076287
|View full text |Cite
|
Sign up to set email alerts
|

Who Is in Control? Practical Physical Layer Attack and Defense for mmWave-Based Sensing in Autonomous Vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
38
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 58 publications
(38 citation statements)
references
References 12 publications
0
38
0
Order By: Relevance
“…System-level evaluation refers to evaluating the attack/defense impacts at the vehicle driving behavior level considering full-stack AD system pipelines and closed-loop control. The evaluation setups used to achieve this can be generally classified into two categories: (1) Real vehicle-based, where a real vehicle is under partial (e.g., steering only [79]) or full (i.e., steering, throttle, and braking [57,89]) closedloop control of the AD system to perform certain driving maneuvers with the presence of attacks, which are typically deployed in the physical world as well; and (2) Simulationbased, where the critical elements in the closed-loop control (e.g., sensing/actuation hardware and the physical world) are fully or partially simulated, using either existing simulation software [38,78,80,92,93] or custom-built modeling [92].…”
Section: Systematization Of Evaluation Methodologymentioning
confidence: 99%
See 3 more Smart Citations
“…System-level evaluation refers to evaluating the attack/defense impacts at the vehicle driving behavior level considering full-stack AD system pipelines and closed-loop control. The evaluation setups used to achieve this can be generally classified into two categories: (1) Real vehicle-based, where a real vehicle is under partial (e.g., steering only [79]) or full (i.e., steering, throttle, and braking [57,89]) closedloop control of the AD system to perform certain driving maneuvers with the presence of attacks, which are typically deployed in the physical world as well; and (2) Simulationbased, where the critical elements in the closed-loop control (e.g., sensing/actuation hardware and the physical world) are fully or partially simulated, using either existing simulation software [38,78,80,92,93] or custom-built modeling [92].…”
Section: Systematization Of Evaluation Methodologymentioning
confidence: 99%
“…RADAR inputs to cause it to resolve fake objects at specific distances and angles. Prior work [89] demonstrates RADAR spoofing capability in physical world and shows that it can cause AD system to recognize fake obstacles. • GPS spoofing refers to sending fake satellite signals to the GPS receiver, causing it to resolve positions that are specified by the attacker.…”
Section: Sensor Attack Vectorsmentioning
confidence: 99%
See 2 more Smart Citations
“…(1) Perception-level attacks [18]- [37] target one particular perception function to make it estimate incorrect states. (2) Vehicle-level attacks [6], [38]- [78] consider not only fooling the perception function, but also propagating the wrong state estimates towards the subsequent stages and final actions. Both categories of works are only limited to a few specific functions and control flows in an RV system, leaving a large number of unexplored vulnerabilities.…”
Section: Introductionmentioning
confidence: 99%