mmSpoof: Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array
FMCW radars are integral to automotive driving for robust and weather-resistant sensing of surrounding objects. However, these radars are vulnerable to spoofing attacks that can cause sensor malfunction and potentially lead to accidents. Previous attempts at spoofing FMCW radars using an attacker de...
Gespeichert in:
Hauptverfasser: | , , , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1821 |
---|---|
container_issue | |
container_start_page | 1807 |
container_title | |
container_volume | |
creator | Reddy Vennam, Rohith Jain, Ish Kumar Bansal, Kshitiz Orozco, Joshua Shukla, Puja Ranganathan, Aanjhan Bharadia, Dinesh |
description | FMCW radars are integral to automotive driving for robust and weather-resistant sensing of surrounding objects. However, these radars are vulnerable to spoofing attacks that can cause sensor malfunction and potentially lead to accidents. Previous attempts at spoofing FMCW radars using an attacker device have not been very effective due to the need for synchronization between the attacker and the victim. We present a novel spoofing mechanism called mmSpoof that does not require synchronization and is resilient to various security features and countermeasures of the victim radar. Our spoofing mechanism uses a "reflect array" based attacker device that reflects the radar signal with appropriate modulation to spoof the victim's radar. We provide insights and mechanisms to flexibly spoof any distance and velocity on the victim's radar using a unique frequency shift at the mmSpoof's reflect array. We design a novel algorithm to estimate this frequency shift without assuming prior information about the victim's radar. We show the effectiveness of our spoofing using a compact and mobile setup with commercial-off-the-shelf components in realistic automotive driving scenarios with commercial radars. |
doi_str_mv | 10.1109/SP46215.2023.10179371 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_RIE</sourceid><recordid>TN_cdi_ieee_primary_10179371</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10179371</ieee_id><sourcerecordid>10179371</sourcerecordid><originalsourceid>FETCH-LOGICAL-i204t-ed4281e219340d09fcd588ea5d40dc02e293c29cd56dc4b3c3a9c552c7496dd03</originalsourceid><addsrcrecordid>eNo1kNtKw0AURUdBsK3-gcL8QOKZM5dkfAvFG1SUtD6XceZERpKmJFOlf2-9PW3WYrMfNmOXAnIhwF4tn5VBoXMElLkAUVhZiCM2FcZoZaU06phNUBY6EwjFKZuO4zsAgrRqwlZdt9z2fXPNaxpjG2mT-I-ImzfeN7zapb7rU_wg_hjbNnaUaMg-3YFrF9ww8t34Xa2packnXg2D25-xk8a1I53_5Yy93N6s5vfZ4unuYV4tsoigUkZBYSkIhZUKAtjGB12W5HQ4oAcktNKjPVgTvHqVXjrrtUZfKGtCADljF7-7kYjW2yF2btiv_y-QX2ILUUs</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>mmSpoof: Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array</title><source>IEEE Electronic Library (IEL)</source><creator>Reddy Vennam, Rohith ; Jain, Ish Kumar ; Bansal, Kshitiz ; Orozco, Joshua ; Shukla, Puja ; Ranganathan, Aanjhan ; Bharadia, Dinesh</creator><creatorcontrib>Reddy Vennam, Rohith ; Jain, Ish Kumar ; Bansal, Kshitiz ; Orozco, Joshua ; Shukla, Puja ; Ranganathan, Aanjhan ; Bharadia, Dinesh</creatorcontrib><description>FMCW radars are integral to automotive driving for robust and weather-resistant sensing of surrounding objects. However, these radars are vulnerable to spoofing attacks that can cause sensor malfunction and potentially lead to accidents. Previous attempts at spoofing FMCW radars using an attacker device have not been very effective due to the need for synchronization between the attacker and the victim. We present a novel spoofing mechanism called mmSpoof that does not require synchronization and is resilient to various security features and countermeasures of the victim radar. Our spoofing mechanism uses a "reflect array" based attacker device that reflects the radar signal with appropriate modulation to spoof the victim's radar. We provide insights and mechanisms to flexibly spoof any distance and velocity on the victim's radar using a unique frequency shift at the mmSpoof's reflect array. We design a novel algorithm to estimate this frequency shift without assuming prior information about the victim's radar. We show the effectiveness of our spoofing using a compact and mobile setup with commercial-off-the-shelf components in realistic automotive driving scenarios with commercial radars.</description><identifier>EISSN: 2375-1207</identifier><identifier>EISBN: 1665493364</identifier><identifier>EISBN: 9781665493369</identifier><identifier>DOI: 10.1109/SP46215.2023.10179371</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>IEEE</publisher><subject>Automobiles ; Autonomous vehicles ; Current measurement ; FMCW Radar ; Frequency modulation ; Millimeter wave radar ; Millimeter-wave ; Radar ; Radar countermeasures ; Reflect array ; Sensing ; Spoofing ; Synchronization ; Wireless</subject><ispartof>2023 IEEE Symposium on Security and Privacy (SP), 2023, p.1807-1821</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10179371$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,796,23930,23931,25140,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10179371$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Reddy Vennam, Rohith</creatorcontrib><creatorcontrib>Jain, Ish Kumar</creatorcontrib><creatorcontrib>Bansal, Kshitiz</creatorcontrib><creatorcontrib>Orozco, Joshua</creatorcontrib><creatorcontrib>Shukla, Puja</creatorcontrib><creatorcontrib>Ranganathan, Aanjhan</creatorcontrib><creatorcontrib>Bharadia, Dinesh</creatorcontrib><title>mmSpoof: Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array</title><title>2023 IEEE Symposium on Security and Privacy (SP)</title><addtitle>SP</addtitle><description>FMCW radars are integral to automotive driving for robust and weather-resistant sensing of surrounding objects. However, these radars are vulnerable to spoofing attacks that can cause sensor malfunction and potentially lead to accidents. Previous attempts at spoofing FMCW radars using an attacker device have not been very effective due to the need for synchronization between the attacker and the victim. We present a novel spoofing mechanism called mmSpoof that does not require synchronization and is resilient to various security features and countermeasures of the victim radar. Our spoofing mechanism uses a "reflect array" based attacker device that reflects the radar signal with appropriate modulation to spoof the victim's radar. We provide insights and mechanisms to flexibly spoof any distance and velocity on the victim's radar using a unique frequency shift at the mmSpoof's reflect array. We design a novel algorithm to estimate this frequency shift without assuming prior information about the victim's radar. We show the effectiveness of our spoofing using a compact and mobile setup with commercial-off-the-shelf components in realistic automotive driving scenarios with commercial radars.</description><subject>Automobiles</subject><subject>Autonomous vehicles</subject><subject>Current measurement</subject><subject>FMCW Radar</subject><subject>Frequency modulation</subject><subject>Millimeter wave radar</subject><subject>Millimeter-wave</subject><subject>Radar</subject><subject>Radar countermeasures</subject><subject>Reflect array</subject><subject>Sensing</subject><subject>Spoofing</subject><subject>Synchronization</subject><subject>Wireless</subject><issn>2375-1207</issn><isbn>1665493364</isbn><isbn>9781665493369</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2023</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo1kNtKw0AURUdBsK3-gcL8QOKZM5dkfAvFG1SUtD6XceZERpKmJFOlf2-9PW3WYrMfNmOXAnIhwF4tn5VBoXMElLkAUVhZiCM2FcZoZaU06phNUBY6EwjFKZuO4zsAgrRqwlZdt9z2fXPNaxpjG2mT-I-ImzfeN7zapb7rU_wg_hjbNnaUaMg-3YFrF9ww8t34Xa2packnXg2D25-xk8a1I53_5Yy93N6s5vfZ4unuYV4tsoigUkZBYSkIhZUKAtjGB12W5HQ4oAcktNKjPVgTvHqVXjrrtUZfKGtCADljF7-7kYjW2yF2btiv_y-QX2ILUUs</recordid><startdate>202305</startdate><enddate>202305</enddate><creator>Reddy Vennam, Rohith</creator><creator>Jain, Ish Kumar</creator><creator>Bansal, Kshitiz</creator><creator>Orozco, Joshua</creator><creator>Shukla, Puja</creator><creator>Ranganathan, Aanjhan</creator><creator>Bharadia, Dinesh</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>202305</creationdate><title>mmSpoof: Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array</title><author>Reddy Vennam, Rohith ; Jain, Ish Kumar ; Bansal, Kshitiz ; Orozco, Joshua ; Shukla, Puja ; Ranganathan, Aanjhan ; Bharadia, Dinesh</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i204t-ed4281e219340d09fcd588ea5d40dc02e293c29cd56dc4b3c3a9c552c7496dd03</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Automobiles</topic><topic>Autonomous vehicles</topic><topic>Current measurement</topic><topic>FMCW Radar</topic><topic>Frequency modulation</topic><topic>Millimeter wave radar</topic><topic>Millimeter-wave</topic><topic>Radar</topic><topic>Radar countermeasures</topic><topic>Reflect array</topic><topic>Sensing</topic><topic>Spoofing</topic><topic>Synchronization</topic><topic>Wireless</topic><toplevel>online_resources</toplevel><creatorcontrib>Reddy Vennam, Rohith</creatorcontrib><creatorcontrib>Jain, Ish Kumar</creatorcontrib><creatorcontrib>Bansal, Kshitiz</creatorcontrib><creatorcontrib>Orozco, Joshua</creatorcontrib><creatorcontrib>Shukla, Puja</creatorcontrib><creatorcontrib>Ranganathan, Aanjhan</creatorcontrib><creatorcontrib>Bharadia, Dinesh</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Reddy Vennam, Rohith</au><au>Jain, Ish Kumar</au><au>Bansal, Kshitiz</au><au>Orozco, Joshua</au><au>Shukla, Puja</au><au>Ranganathan, Aanjhan</au><au>Bharadia, Dinesh</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>mmSpoof: Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array</atitle><btitle>2023 IEEE Symposium on Security and Privacy (SP)</btitle><stitle>SP</stitle><date>2023-05</date><risdate>2023</risdate><spage>1807</spage><epage>1821</epage><pages>1807-1821</pages><eissn>2375-1207</eissn><eisbn>1665493364</eisbn><eisbn>9781665493369</eisbn><coden>IEEPAD</coden><abstract>FMCW radars are integral to automotive driving for robust and weather-resistant sensing of surrounding objects. However, these radars are vulnerable to spoofing attacks that can cause sensor malfunction and potentially lead to accidents. Previous attempts at spoofing FMCW radars using an attacker device have not been very effective due to the need for synchronization between the attacker and the victim. We present a novel spoofing mechanism called mmSpoof that does not require synchronization and is resilient to various security features and countermeasures of the victim radar. Our spoofing mechanism uses a "reflect array" based attacker device that reflects the radar signal with appropriate modulation to spoof the victim's radar. We provide insights and mechanisms to flexibly spoof any distance and velocity on the victim's radar using a unique frequency shift at the mmSpoof's reflect array. We design a novel algorithm to estimate this frequency shift without assuming prior information about the victim's radar. We show the effectiveness of our spoofing using a compact and mobile setup with commercial-off-the-shelf components in realistic automotive driving scenarios with commercial radars.</abstract><pub>IEEE</pub><doi>10.1109/SP46215.2023.10179371</doi><tpages>15</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | EISSN: 2375-1207 |
ispartof | 2023 IEEE Symposium on Security and Privacy (SP), 2023, p.1807-1821 |
issn | 2375-1207 |
language | eng |
recordid | cdi_ieee_primary_10179371 |
source | IEEE Electronic Library (IEL) |
subjects | Automobiles Autonomous vehicles Current measurement FMCW Radar Frequency modulation Millimeter wave radar Millimeter-wave Radar Radar countermeasures Reflect array Sensing Spoofing Synchronization Wireless |
title | mmSpoof: Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-24T19%3A52%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=mmSpoof:%20Resilient%20Spoofing%20of%20Automotive%20Millimeter-wave%20Radars%20using%20Reflect%20Array&rft.btitle=2023%20IEEE%20Symposium%20on%20Security%20and%20Privacy%20(SP)&rft.au=Reddy%20Vennam,%20Rohith&rft.date=2023-05&rft.spage=1807&rft.epage=1821&rft.pages=1807-1821&rft.eissn=2375-1207&rft.coden=IEEPAD&rft_id=info:doi/10.1109/SP46215.2023.10179371&rft_dat=%3Cieee_RIE%3E10179371%3C/ieee_RIE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1665493364&rft.eisbn_list=9781665493369&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=10179371&rfr_iscdi=true |