What Would Trojans Do? Exploiting Partial-Information Vulnerabilities in Autonomous Vehicle Sensing

📅 2023-03-06
📈 Citations: 5
Influential: 0
📄 PDF
🤖 AI Summary
This work uncovers a novel security vulnerability in autonomous vehicle sensors—particularly LiDAR—under partial-information attacks: adversaries can stealthily inject network-layer Trojans while respecting sensor integrity constraints. We first identify LiDAR’s critical fragility in multi-sensor fusion pipelines. To address this, we propose a probabilistic data asymmetry monitor and design a trajectory-level 3D LiDAR–monocular camera fusion method (T2T-3DLM) to achieve robust, security-aware perception. Evaluated on AV simulation platforms and real-world datasets, our approach integrates adversarial modeling and integrity constraint analysis. Experiments demonstrate that the proposed solution significantly reduces Trojan attack success rates, confirms LiDAR-based attacks pose greater security risks than camera-based ones, and enhances system robustness substantially—without compromising functional performance.
📝 Abstract
Safety-critical sensors in autonomous vehicles (AVs) form an essential part of the vehicle's trusted computing base (TCB), yet they are highly susceptible to attacks. Alarmingly, Tier 1 manufacturers have already exposed vulnerabilities to attacks introducing Trojans that can stealthily alter sensor outputs. We analyze the feasible capability and safety-critical outcomes of an attack on sensing at a cyber level. To further address these threats, we design realistic attacks in AV simulators and real-world datasets under two practical constraints: attackers (1) possess only partial information and (2) are constrained by data structures that maintain sensor integrity.Examining the role of camera and LiDAR in multi-sensor AVs, we find that attacks targeting only the camera have minimal safety impact due to the sensor fusion system's strong reliance on 3D data from LiDAR. This reliance makes LiDAR-based attacks especially detrimental to safety. To mitigate the vulnerabilities, we introduce security-aware sensor fusion incorporating (1) a probabilistic data-asymmetry monitor and (2) a scalable track-to-track fusion of 3D LiDAR and monocular detections (T2T-3DLM). We demonstrate that these methods significantly diminish attack success rate.
Problem

Research questions and friction points this paper is trying to address.

Analyzing cyber-level attacks on autonomous vehicle sensors.
Designing realistic attacks under partial information constraints.
Introducing security-aware sensor fusion to mitigate vulnerabilities.
Innovation

Methods, ideas, or system contributions that make the work stand out.

Security-aware sensor fusion for AVs
Probabilistic data-asymmetry monitor
Track-to-track fusion of 3D LiDAR
🔎 Similar Papers
No similar papers found.
R
R. S. Hallyburton
Duke University
Qingzhao Zhang
Qingzhao Zhang
University of Arizona
system securitysoftware securityAI security
Z
Z. Mao
University of Michigan
M
Miroslav Pajic
Duke University