论文标题

魔鬼的漂移:在GPS欺骗下高级自动驾驶中的多传感器融合本地化的安全性(扩展版)

Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing (Extended Version)

论文作者

Shen, Junjie, Won, Jun Yeon, Chen, Zeyuan, Chen, Qi Alfred

论文摘要

对于高级自动驾驶汽车(AV),本地化是高度安全和安全性的。对此的直接威胁是GPS欺骗,但幸运的是,当今的AV系统主要使用多传感器融合(MSF)算法,通常认为这些算法实际上有可能击败GPS欺骗。但是,在GPS欺骗的情况下,尤其是在AV设置中,当今的无国界医生算法是否确实足够安全,尚无先前研究。在这项工作中,我们进行了第一项研究以填补这一关键空白。作为第一项研究,我们专注于具有设计和实施水平代表性的生产级MSF,并确定两个特定于AV特定的攻击目标,即越野和错误的攻击。 为了系统地了解安全性,我们首先分析了上限的攻击效果,并发现可以从根本上击败MSF设计原则的接管效果。我们执行原因分析,发现这种脆弱性仅在动态和非确定性上出现。利用这种见解,我们设计了FusionRripper,这是一种新颖而一般的攻击,可以机会捕捉和利用带来的脆弱性。我们在6个现实世界传感器的轨迹上对其进行了评估,发现FusionRipper可以在所有轨道上的越野攻击和错误的攻击中分别达到97%和91.3%的成功率。我们还发现,对于欺骗不准确性等实用因素,这是非常健壮的。为了提高实用性,我们进一步设计了一种离线方法,该方法可以有效地识别两个攻击目标平均成功率超过80%的攻击参数,最多的成本为一天。我们还讨论有前途的防御指示。

For high-level Autonomous Vehicles (AV), localization is highly security and safety critical. One direct threat to it is GPS spoofing, but fortunately, AV systems today predominantly use Multi-Sensor Fusion (MSF) algorithms that are generally believed to have the potential to practically defeat GPS spoofing. However, no prior work has studied whether today's MSF algorithms are indeed sufficiently secure under GPS spoofing, especially in AV settings. In this work, we perform the first study to fill this critical gap. As the first study, we focus on a production-grade MSF with both design and implementation level representativeness, and identify two AV-specific attack goals, off-road and wrong-way attacks. To systematically understand the security property, we first analyze the upper-bound attack effectiveness, and discover a take-over effect that can fundamentally defeat the MSF design principle. We perform a cause analysis and find that such vulnerability only appears dynamically and non-deterministically. Leveraging this insight, we design FusionRipper, a novel and general attack that opportunistically captures and exploits take-over vulnerabilities. We evaluate it on 6 real-world sensor traces, and find that FusionRipper can achieve at least 97% and 91.3% success rates in all traces for off-road and wrong-way attacks respectively. We also find that it is highly robust to practical factors such as spoofing inaccuracies. To improve the practicality, we further design an offline method that can effectively identify attack parameters with over 80% average success rates for both attack goals, with the cost of at most half a day. We also discuss promising defense directions.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源