Millimeter-wave radar systems are one of the core components of the safety-critical Advanced Driver Assistant System (ADAS) of a modern vehicle. Due to their ability to operate efficiently despite bad weather conditions and poor visibility, they are often the only reliable sensor a car has to detect and evaluate potential dangers in the surrounding environment. In this paper, we propose several attacks against automotive radars for the purposes of assessing their reliability in real-world scenarios. Using COTS hardware, we are able to successfully interfere with automotive-grade FMCW radars operating in the commonly used 77GHz frequency band, deployed in real-world, truly wireless environments. Our strongest type of interference is able to trick the victim into detecting virtual (moving) objects. We also extend this attack with a novel method that leverages noise to remove real-world objects, thus complementing the aforementioned object spoofing attack. We evaluate the viability of our attacks in two ways. First, we establish a baseline by implementing and evaluating an unrealistically powerful adversary which requires synchronization to the victim in a limited setup that uses wire-based chirp synchronization. Later, we implement, for the first time, a truly wireless attack that evaluates a weaker but realistic adversary which is non-synchronized and does not require any adjustment feedback from the victim. Finally, we provide theoretical fundamentals for our findings, and discuss the efficiency of potential countermeasures against the proposed attacks. We plan to release our software as open-source.
翻译:现代车辆的安全临界高级驾驶助理系统(ADAS)的核心组成部分之一,是一台现代车辆的安全临界高级驾驶助理系统(ADAS)的核心组成部分之一。由于它们有能力在恶劣的天气条件和可见度低的情况下高效运行,它们往往是汽车探测和评估周围环境中潜在危险的唯一可靠的传感器。在本文中,我们提议对汽车雷达进行几次攻击,目的是评估其真实世界情景中的可靠性。使用COTS硬件,我们能够成功地干预在现实世界真正无线环境中部署的通用77GHz频率波段内运行的汽车级调频CW雷达。我们最强的干扰能够诱骗受害者探测虚拟(移动)物体。我们最强的干扰类型能够诱使受害者侦测到虚拟(移动)物体。我们还以新的方法扩大攻击范围,利用噪音清除现实世界物体,从而补充上述目标的潜伏攻击。我们用两种方式评估攻击的可行性。首先,我们通过执行和评价不现实的强大、需要与受害者同步的有限组合,需要与受害者同步。后来,我们实施了最强的干扰类型的干扰。我们实施,第一次执行,用一种新式的反射源的反攻击计划,要求我们从不现实的理论攻击中进行不现实化的反向的反射的反向,最后的反射的反射反应。我们进行较弱的反向的反射波的反射。我们进行不现实的理论的反射的反射的反射的反射的反射的反射的反向的反向性反射。最后的反向性反向性反向性反向性反向性反射。我们从反射波波波波。我们从较弱的反射出的反射。最后的反向的反射。最后的反射的反射出的反射的反射的理论的反向性反向性反向的反向的反射的反射波波波波波波波波波波波波波波波波波波波波波波。我们从较弱的反射波波波波波波波波波波波波波波波。我们从较弱的反射出的反射出的反射出的反射出较低的反射出较弱的反射出较弱的反射出较弱的反射波波波波波波波波波波波波