A Brief Survey on Autonomous Vehicle Possible Attacks, Exploits and Vulnerabilities

Advanced driver assistance systems are advancing at a rapid pace and all major companies started investing in developing the autonomous vehicles. But the security and reliability is still uncertain and debatable. Imagine that a vehicle is compromised by the attackers and then what they can do. An attacker can control brake, accelerate and even steering which can lead to catastrophic consequences. This paper gives a very short and brief overview of most of the possible attacks on autonomous vehicle software and hardware and their potential implications.

[1]  Kwok-Yan Lam,et al.  Security of autonomous vehicle as a cyber-physical system , 2017, 2017 7th International Symposium on Embedded Computing and System Design (ISED).

[2]  Péter Gáspár,et al.  Security issues and vulnerabilities in connected car systems , 2015, 2015 International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS).

[3]  V. V. Sajith Variyar,et al.  Obstacle classification and detection for vision based navigation for autonomous driving , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[4]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[5]  Xinming Huang,et al.  Security of Autonomous Systems Employing Embedded Computing and Sensors , 2013, IEEE Micro.

[6]  Wei Yan A two-year survey on security challenges in automotive threat landscape , 2015, 2015 International Conference on Connected Vehicles and Expo (ICCVE).

[7]  Prakash Ranganathan,et al.  Next generation distributed and networked autonomous vehicles: Review , 2018, 2018 10th International Conference on Communication Systems & Networks (COMSNETS).

[8]  Atul Prakash,et al.  Robust Physical-World Attacks on Machine Learning Models , 2017, ArXiv.

[9]  Amara Dinesh Kumar,et al.  Novel Deep Learning Model for Traffic Sign Detection Using Capsule Networks , 2018, ArXiv.

[10]  Qiang Ni,et al.  Driving with Sharks: Rethinking Connected Vehicles with Vehicle Cybersecurity , 2017, IEEE Vehicular Technology Magazine.

[11]  V. V. Sajith Variyar,et al.  Gps based navigation system for autonomous car , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[12]  Xiang Li,et al.  Controlling a Car Through OBD Injection , 2016, 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud).

[13]  Ajmal Mian,et al.  Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey , 2018, IEEE Access.

[14]  Thomas Engel,et al.  A Car Hacking Experiment: When Connectivity Meets Vulnerability , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).

[15]  Jihas Khan Vehicle network security testing , 2017, 2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS).

[16]  Jonathan Miller,et al.  Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges , 2017, IEEE Transactions on Intelligent Transportation Systems.