Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles
Frustum
Spoofing attack
Sensor Fusion
Hacker
DOI:
10.48550/arxiv.2106.07098
Publication Date:
2021-01-01
AUTHORS (5)
ABSTRACT
To enable safe and reliable decision-making, autonomous vehicles (AVs) feed sensor data to perception algorithms understand the environment. Sensor fusion with multi-frame tracking is becoming increasingly popular for detecting 3D objects. Thus, in this work, we perform an analysis of camera-LiDAR fusion, AV context, under LiDAR spoofing attacks. Recently, LiDAR-only was shown vulnerable attacks; however, demonstrate these attacks are not capable disrupting fusion. We then define a novel, context-aware attack: frustum attack, show that out 8 widely used - across 3 architectures all significantly attack. In addition, attack stealthy existing defenses against as it preserves consistencies between camera semantics. Finally, can be exercised consistently over time form longitudinal sequences, compromising module creating adverse outcomes on end-to-end control.
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES ()
CITATIONS ()
EXTERNAL LINKS
PlumX Metrics
RECOMMENDATIONS
FAIR ASSESSMENT
Coming soon ....
JUPYTER LAB
Coming soon ....