Nina Shamsi (Northeastern University), Kaeshav Chandrasekar, Yan Long, Christopher Limbach (University of Michigan), Keith Rebello (Boeing), Kevin Fu (Northeastern University)

Control or disablement of computer vision-assisted autonomous vehicles via acoustic interference is an open problem in vehicle cybersecurity research. This work explores a new threat model in this problem space: acoustic interference via high-speed, pulsed lasers to non-destructively affect drone sensors. Initial experiments verified the feasibility of laser-induced acoustic wave generation at resonant frequencies of MEMS gyroscope sensors. Acoustic waves generated by a lab-scale laser produced a 300-fold noise floor modification in commercial off-of-the-shelf (COTS) gyroscope sensor readings. Computer vision functionalities of drones often depend on such vulnerable sensors, and can be a target of this new threat model because of camera motion blurs caused by acoustic interference. The effect of laser-induced acoustics in object detection datasets was simulated by extracting blur kernels from drone images captured under different conditions of acoustic interference, including speaker-generated sound to emulate higher intensity lasers, and evaluated using state-of-theart object detection models. The results show an average of 41.1% decrease in mean average precision for YOLOv8 across two datasets, and suggest an inverse relationship between an object detection model’s mean average precision and acoustic intensity. Object detection models with at least 60M parameters appear more resilient against laser-induced acoustic interference. Initial characterizations of laser-induced acoustic interference reveal future potential threat models affecting sensors and downstream software systems of autonomous vehicles.

View More Papers

WIP: Towards Practical LiDAR Spoofing Attack against Vehicles Driving...

Ryo Suzuki (Keio University), Takami Sato (University of California, Irvine), Yuki Hayakawa, Kazuma Ikeda, Ozora Sako, Rokuto Nagata (Keio University), Qi Alfred Chen (University of California, Irvine), Kentaro Yoshioka (Keio University)

Read More

LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors

Chengkun Wei (Zhejiang University), Wenlong Meng (Zhejiang University), Zhikun Zhang (CISPA Helmholtz Center for Information Security and Stanford University), Min Chen (CISPA Helmholtz Center for Information Security), Minghu Zhao (Zhejiang University), Wenjing Fang (Ant Group), Lei Wang (Ant Group), Zihui Zhang (Zhejiang University), Wenzhi Chen (Zhejiang University)

Read More

IDA: Hybrid Attestation with Support for Interrupts and TOCTOU

Fatemeh Arkannezhad (UCLA), Justin Feng (UCLA), Nader Sehatbakhsh (UCLA)

Read More

Short: Rethinking Secure Pairing in Drone Swarms

Muslum Ozgur Ozmen, Habiba Farrukh, Hyungsub Kim, Antonio Bianchi, Z. Berkay Celik (Purdue University)

Read More