Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

70
Can You Trust Autonomous Vehicles: Contactless Attacks against Sensors of Self-Driving Vehicles Jianhao Liu Qihoo360 SKY-GO Team Chen Yan USSLab, Zhejiang University Wenyuan Xu Zhejiang University & University of South Carolina

Transcript of Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Page 1: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Can You Trust Autonomous Vehicles:

Contactless Attacks against Sensors of

Self-Driving Vehicles

Jianhao Liu Qihoo360 SKY-GO Team

Chen Yan USSLab, Zhejiang University

Wenyuan Xu Zhejiang University & University of South Carolina

Page 2: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Jianhao LiuDirector

Qihoo 360

SKY-GO Vehicle Cyber Security Team

Who Are We

2

Chen YanPh.D. Student

USSLab

Zhejiang University

Wenyuan XuProfessor

Zhejiang University

University of South Carolina

Page 3: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Roadmap

• Autonomous Vehicles

• Hacking Sensors

• Our Attacks– Ultrasonic sensors

– MMW radars

– Cameras

• Discussion

3

Page 4: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

The Car Hacking History

- Car ===> CAN bus hacking

- Connected car ===> Telematics hacking

- Autonomous car ===> Automatic system hacking

4

Page 5: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

What is Autonomous Vehicle?

5Source: Michael Aeberhard, BMW Group Research and Technology

Page 6: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Levels of Driving Automation

6

SAE J3016

Advanced Driver Assistance System

(ADAS)

GoogleSelf-Driving Car(in experiment)

Tesla

Page 7: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Sensors in automated driving system

7Source:Michael Aeberhard, BMW Group Research and Technology

Human-MachineInterface

V2X

ScenarioAssessment

Driving Function

Sensors

Page 8: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

8

Automatic Driving Applications

Page 9: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Sensors for Self-Driving

9Source: Texas Instruments

Ultrasonic SensorsLimited to proximity, low speed manoeuvres.

CamerasSenses reflected light,

limited when dark.

Sees colour, so can be

used to read signs,

signals, etc.

LiDAREmits light, so darkness not an issue. Some

weather limitation.

RadarWorks in low light & poor weather, but lower resolution.

Page 10: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Vehicle Controllers

10

Electric Power Steering

Electronic Throttle

Electronic Brake

Page 11: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

How to Hack Sensors?

Automated System Control

HMI Display

Sensors

Spoofing

Jamming

MMW Radars

Blinding

Cameras

Ultrasonic Sensors

Spoofing

Jamming

11

Page 12: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Tesla Autopilot

12

Autosteer

Autopark

Summon

Auto Lane Change

Traffic-Aware Cruise Control

Page 13: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Tesla: A Tragic Loss

• First fatal crash while using Autopilot on May 7, 2016.

• Reliability of sensors.

13

Source: The New York Times

First Tesla Accident in China Caused by Autopilot

Page 14: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Existing Sensors on Tesla Model S

14

One cameraA forward looking camera is mounted

on the windshield under the rear view

mirror.

12 ultrasonic sensorsUltrasonic sensors are located near

the front and rear bumpers.

One MMW Radar

A Medium range Radar is mounted in

the front grill.

Page 15: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

HMI Display Mistakes – Demo on Tesla

15

Page 16: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

16

Control Mistakes – Demo on Tesla

Page 17: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Attacking Ultrasonic SensorsOn Tesla, Audi, Volkswagen, and Ford

17

Page 18: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Ultrasonic Sensor

What is ultrasonic sensor?

• Measures distance

• Proximity sensor (< 2m)

• Applications– Parking assistance

– Parking space detection

– Self parking

– Tesla’s summon

18

Page 19: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Parking assistance & Distance display

19

Page 20: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Misuse 1: The car doesn’t stop while it should.

20

Why doesn’t the car stop??Oh NOOO!!!

Hey! Mind the glass!!!

Page 21: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Misuse1: The car doesn’t stop while it should.

21

Page 22: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Misuse 2: The car stops while it shouldn’t.

22

Is it cursed?! Why the car can’t park in??

Page 23: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

How do ultrasonic sensors work?

• Emit ultrasound and receive echoes

• Piezoelectric Effect

• Measure the propagation time (Time of Flight)

• Calculate the distance

23

: propagation time of echoes

: velocity of sound in air

UltrasonicSensor

Distance

Electrical signal

Page 24: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Attacking ultrasonic sensors

Attacks:

• Jamming – generates ultrasonic noises – denial of service

• Spoofing – crafts fake ultrasonic echo pulses – alters distance

• Quieting – diminishes original ultrasonic echoes – hides obstacles

Equipment:

• Ultrasonic transducers ($0.4) – emit ultrasound

• Signal suppliers – generate excitation signals– Arduino ($24.95)

– Signal generator (~$20)

24

Page 25: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Jamming Attack

• Basic Idea:– Injecting ultrasonic noises

– At resonant frequency (40 – 50 kHz)

– Causing Denial of Service

• Tested ultrasonic sensors:– In laboratories: 8 models of stand-alone ultrasonic sensors

– Outdoors: Tesla, Audi, Volkswagen, Ford

25

Page 26: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Jamming Attack – in lab

• 8 models of ultrasonic sensors– HC-SR04

– SRF01

– SRF05

– MaxSonar MB1200

– JSN-SR04T

– FreeCars V4

– Grove ultrasonic ranger

– Audi Q3 sensors

• Sensor reading– Zero distance

– Maximum distance

26

No jamming

Received electrical signals at the sensor

Excitation pulse

Echo pulses

WeakJamming

Noises

Next cycle

StrongJamming

Noises

Page 27: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

How should cars behaveto jamming?

Zero distance?

or

Maximum distance?

27

Page 28: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Jamming Attack – on vehicles

• 4 different vehicles– Audi Q3

– Volkswagen Tiguan

– Ford Fiesta

– Tesla Model S

• Self parking

• Summon

• Results– Maximum distance

28

Experiment setup on Tesla Model S

Page 29: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Jamming Attack – Demo on Audi

29

Jamming hides obstacles.

Page 30: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Jamming Attack – Results

• On ultrasonic sensors– Zero or maximum distance

• On vehicles with parking assistance– Maximum distance

• On self-parking and summon?

30Tesla Normal Tesla Jammed

Audi Normal Audi Jammed

Page 31: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Jamming Attack – Demo on Tesla Summon

31

Jamming hides obstacles.

Page 32: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Jamming Attack – Demo on Tesla Summon

32

The interferer was hit & stopped working.

Jamming distance can be increased.

Page 33: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Jamming Attack – Results

• On ultrasonic sensors– Zero or maximum distance

• On vehicles with parking assistance– Maximum distance

• On self-parking and summon– Car does not stop under strong jamming!

33Tesla Normal Tesla Jammed

Audi Normal Audi Jammed

Page 34: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Why Zero or Max distance?

Different sensor designs

• Zero distance– Compare with a fixed threshold

• Maximum distanceApplication Specific IC!

34

Threshold

Page 35: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Why Zero or Max distance?

Different sensor designs

• Zero distance– Compare with a fixed threshold

• Maximum distance– Adaptive threshold (Noise Suppression)

35

No jammingExcitation pulse

Echo pulses

Time of flight

Weak Jamming

Increased noise floor

StrongJamming

Overwhelmed by noise

Page 36: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Spoofing Attack

Basic Idea

• Injecting ultrasonic pulses

• At certain time

Non-trivial

• Only the first justifiable

echo will be processed

• Effective time slot

36

Effective time slot

Page 37: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Spoofing Attack – Demo on Tesla

37

Spoofing alters distance.

Page 38: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Spoofing Attack – Demo on Audi

38

Spoofing alters distance.

Page 39: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Spoofing Attack – Results

• Manipulate sensor readings– On stand-alone ultrasonic sensors

– On cars

39

Tesla Normal Tesla Spoofed Audi Spoofed

Parking Aid

Page 40: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Acoustic Quieting

• Acoustic Cancellation– Cancel original sound with

ones of reversed phase

– Minor phase and

amplitude adjustment

• Cloaking – Sound absorbing materials

(e.g., damping foams ($3/m2))

– Same effect as jamming!

40

Page 41: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Cloaking Car – Demo

41

Cloaking hides car.

Page 42: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Cloaking Human – Demo

42

Cloaking hides human.

Page 43: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Invisible car! Invisible man! Invisible glass! Whee!

43

Bat Unfriendly Glass

Page 44: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Attacking Millimeter Wave RadarsOn Tesla Model S

44

Page 45: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Millimeter Wave Radar

45

What is MMW Radar?

• Measures distance, angle, speed, shape

• Short to long range sensing (30-250m)

• Applications– Adaptive Cruise Control (ACC)

– Collision Avoidance

– Blind Spot Detection

Page 46: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Misuse 1: The car doesn’t stop while it should.

46

Why doesn’t the car stop??Oh NOOO!!!

Page 47: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Misuse 2: The car stops while it shouldn’t.

47

NO! Don’t stop!!!

I’ll catch you!

Page 48: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

How do MMW Radars work?

• Transmit and receive millimeter electromagnetic waves

• Measure the propagation time

• Modulation– Amplitude

– Frequency (FMCW)

– Phase

• Doppler Effect

• Frequency Bands:– 24 GHz

– 76-77 GHz

48

Block diagram of a bistatic Radar with frequency modulation(Source: H. Winner, Handbook of Driver Assistance Systems)

Page 49: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Frequency Modulated Continuous Wave (FMCW)

49

Fre

qu

en

cy

Time

Reflection TimeΔT

Transmittedsignal

t

Receivedsignal

t+ΔT

Difference Frequencyfd

76.4GHz

76.6GHz

Doppler shift

fd

slopeΔT =

Page 50: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

MMW Radar – To be discovered

#1. Understand Radar signal – Signal Analysis– Frequency range

– Modulation process

– Ramp height (bandwidth)

– Ramps (number, duration)

– Cycle time

#2. Jamming Attack– Feasible?

– What jamming signal?

#3. Spoofing Attack– Feasible?

50

The MMW Radar on Tesla Model S

Page 51: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Attacking MMW Radar – Setup

• Signal Analysis

• Jamming Attack

• Spoofing Attack

• Equipment: – Tesla Model S Radar (A)

– Signal analyzer (C)

– Harmonic mixer (E)

– Oscilloscope (B)

– Signal generator (D)

– Frequency multiplier (E)

51

Page 52: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

MMW Radar Signal Analysis

• Center frequency: 76.65 GHz

• Bandwidth: 450 MHz

• Modulation: FMCW

• Radar chirp details …

52

HarmonicMixer

SignalAnalyzer

Oscilloscope

Frequency domainanalysis

Time domainanalysis

Real-time spectrum on signal analyzer

Page 53: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Attacks on MMW Radar

Jamming Attack

• Jam Radar within the same frequency band, i.e., 76 - 77 GHz

• At fixed frequency

• At sweeping frequency

53

Fre

qu

en

cy

Time

Transmittedsignal

t

Receivedsignal

t+ΔT

Spoofing Attack

• Spoof the radar with similar RF signal

FrequencyMultiplier

SignalGenerator

12.775 GHz 76.65 GHz

Page 54: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

What indicates Autopilot?

• What does blue mean?

• Why stationary?

54

Traffic Aware Cruise Control is on. Autosteer is on.

Page 55: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Jamming Attack – Demo

55

Jamming hides obstacles.

Page 56: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Attacking MMW Radars – Results

56

• Jamming: hides detected objects– Either fixed or sweeping frequency signal worked

• Spoofing: alters object distance

Result of jamming attack

Page 57: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Attacking CamerasMobileye & Point Grey

Tesla Model S

57

Page 58: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Automotive Cameras

What is automotive camera?

• Computer vision

• Forward & backward

• Applications– Lane departure warning

– Lane keeping

– Traffic sign recognition

– Parking assistance

58

Page 59: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Misuse: The car doesn’t steer while it should.

59

NOOO!Turn right!!!

Page 60: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Attacking Cameras – Setup

Attack:

• Blinding

Interferers:

• LED spot ($10)

• Laser pointer ($9)

• Infrared LED spot ($11)

Cameras:

Mobileye, PointGrey

60

Page 61: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Blinding Cameras – Results with LED spot

61

LED toward the board LED toward camera Tonal Distribution

Partial blinding Total blinding

Page 62: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Blinding Cameras – Results with Laser beam

62

Fixed laser beam Wobbling laser beam Damaged Permanently damaged

Total blinding Total blinding

Page 63: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Blinding Cameras – Demo with Laser beam

63

Laser blinds camera.

Page 64: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Response from Tesla

“... We appreciate the hard work you have put into researching potential attacks on sensors used in the Autopilot system. We are currently evaluating your report and investigating the concerns your team has raised so that we can understand if any real world risks have been uncovered ...”

64

Page 65: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Countermeasures

• Sensor fail safe– Zero or maximum

– Anomaly detection

• Sensor redundancy– MIMO system

– Different types of sensors

• Sensor data fusion

65

Thank Goodness!

Page 66: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

What’s next?

• Read more data in vehicular system

• Moving vehicle experiments

• Obtain range and angle measurement

• Increase attack range

66

Page 67: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Conclusions and Takeaway messages

• Attacking existing sensors is feasible

• The sky is not falling

• Sensors should be designed with security in mind– Think about intentional attacks

• For customers– Don’t trust semi-autonomous cars yet

Will we have fully secure autonomous cars?

67

Page 68: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Acknowledgements

• Tongji University– Dr. Xin Bi

• Keysight Open Laboratory & Solution Center, Beijing

• Xpwn Team

• USSLab, Zhejiang University– Weibin Jia, Zhou Zhuang, Guoming Zhang

• ADLAB, AILAB, Qihoo 360– Bin Guo

– Qiang Chen

68

Page 69: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

69

Page 70: Wenyuan xu Minrui yan can you trust autonomous vehicles_slides_liu_final

Questions and Answers

Jianhao Liu [email protected]

Chen Yan [email protected]

Wenyuan Xu [email protected]

Check out our whitepaper!