MobilBye: Attacking ADAS with Camera Spoofing

Dudi Nassi,Raz Ben-Netanel,Yuval Elovici,Ben Nassi
DOI: https://doi.org/10.48550/arXiv.1906.09765
2019-06-24
Abstract:Advanced driver assistance systems (ADASs) were developed to reduce the number of car accidents by issuing driver alert or controlling the vehicle. In this paper, we tested the robustness of Mobileye, a popular external ADAS. We injected spoofed traffic signs into Mobileye to assess the influence of environmental changes (e.g., changes in color, shape, projection speed, diameter and ambient light) on the outcome of an attack. To conduct this experiment in a realistic scenario, we used a drone to carry a portable projector which projected the spoofed traffic sign on a driving car. Our experiments show that it is possible to fool Mobileye so that it interprets the drone carried spoofed traffic sign as a real traffic sign.
Cryptography and Security
What problem does this paper attempt to address?
The problem that this paper attempts to solve is to evaluate the robustness of advanced driver - assistance systems (ADAS), especially Mobileye. Specifically, it is to study how to attack these systems by injecting counterfeit traffic signs. The paper describes a method of using drones to carry portable projectors to project counterfeit traffic signs on moving cars, in order to test the reaction of ADAS to environmental changes (such as color, shape, projection speed, diameter and ambient light), and verify whether it is possible to deceive ADAS into mistaking counterfeit traffic signs for real ones. This not only reveals the security vulnerabilities of current ADAS technology, but also proposes possible defense measures to enhance the security of these systems.