Yulong Cao, Jiaxiang Ma, Kevin Fu (University of Michigan), Sara Rampazzi (University of Florida), and Z. Morley Mao (University of Michigan)

Best Demo Award Runner-up ($200 cash prize)!

Recent studies have demonstrated that LiDAR sensors are vulnerable to spoofing attacks, in which adversaries spoof fake points to fool the car’s perception system to see nonexistent obstacles. However, these attacks are generally conducted on static or simulated scenarios. Therefore, in this demo, we perform the first LiDAR spoofing attack on moving targets. We implemented a minimal tracking system integrated with the spoofer device to perform laser-based attacks on Lidar sensors. The demo shows how it is possible to inject up to 100 fake cloud points under three different scenarios.

View More Papers

Physical Layer Data Manipulation Attacks on the CAN Bus

Abdullah Zubair Mohammed (Virginia Tech), Yanmao Man (University of Arizona), Ryan Gerdes (Virginia Tech), Ming Li (University of Arizona) and Z. Berkay Celik (Purdue University)

Read More

UIScope: Accurate, Instrumentation-free, and Visible Attack Investigation for GUI...

Runqing Yang (Zhejiang University), Shiqing Ma (Rutgers University), Haitao Xu (Arizona State University), Xiangyu Zhang (Purdue University), Yan Chen (Northwestern University)

Read More

Hey Alexa, is this Skill Safe?: Taking a Closer...

Christopher Lentzsch (Ruhr-Universität Bochum), Sheel Jayesh Shah (North Carolina State University), Benjamin Andow (Google), Martin Degeling (Ruhr-Universität Bochum), Anupam Das (North Carolina State University), William Enck (North Carolina State University)

Read More