Researchers prove self-driving cars can be hacked

Hackers can manipulate self-driving cars into seeing people, cars and walls

Hackers can fool self-driving cars into thinking obstructions such as cars, other people and walls are in front of them, forcing the vehicles to take action to evade the non-existent objects.

This would involve the car slowing down or stopping to avoid a collision and means, of course, that automated cars may be fundamentally insecure, vulnerable to cyber criminals armed with nothing more complex than a $60 low-power laser and pulse generator, according to IEEE Spectrum.

The pointer can compromise the reliability of the laser ranging system (lidar) used by self-driving cars to map the world around them. The vulnerability was discovered by researchers at software security company Security Innovation, and will be presented at the Black Hat Europe security conference later this year.

Jonathan Petit, principle scientist at Security Innovation, explained: "I can take echoes of a fake car and put them at any location I want. And I can do the same with a pedestrian or a wall.

"It's kind of a laser pointer, really," he added of the technology needed to hack the cars. "And you don't need the pulse generator when you do the attack. You can easily do it with a Raspberry Pi or an Arduino. It's really off the shelf."

Earlier this year, it was reported that BT Assure Ethical Hacking for Vehicles had been deployed to identify potential security issues present in driverless car technology before they could be exploited.

Back in June, two self-driving cars owned by Google and Delphi narrowly avoided a crash as companies tested the autonomous vehicles in Palo Alto. It was confirmed that over 1.7m miles driven by Google's cars, there had been only 11 accidents recorded.

"There are ways to solve it," continued Petit. "A strong system that does misbehaviour detection could cross-check with other data and filter out those that aren't plausible. But I don't think carmakers have done it yet. This might be a good wake-up call for them."

Featured Resources

BIOS security: The next frontier for endpoint protection

Today’s threats upend traditional security measures

Download now

The role of modern storage in a multi-cloud future

Research exploring the impact of modern storage in defining cloud success

Download now

Enterprise data protection: A four-step plan

An interactive buyers’ guide and checklist

Download now

The total economic impact of Adobe Sign

Cost savings and business benefits enabled by Adobe Sign

Download now

Recommended

8 of the most secure web browsers
web browser

8 of the most secure web browsers

25 Sep 2020
Your essential guide to internet security
Security

Your essential guide to internet security

23 Sep 2020
How to enable private browsing on any device
privacy

How to enable private browsing on any device

22 Sep 2020
Third-party apps are tracking your WhatsApp activity
social media

Third-party apps are tracking your WhatsApp activity

21 Sep 2020

Most Popular

16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
Google removes 17 apps infected with evasive ‘Joker’ malware
malware

Google removes 17 apps infected with evasive ‘Joker’ malware

28 Sep 2020