loader from loading.io

Hacking Car Anti-collision Systems [19:08]

Professor

Release Date: 08/28/2016

Evolving Engineering Education: AI's Impact on the Classroom show art Evolving Engineering Education: AI's Impact on the Classroom

Professor

This response draws on information from the excerpts of Professor Gordon Snyder Jr.'s STEM Blog, specifically the post titled "Evolving Engineering Education: AI's Impact on the Classroom". You asked me to be sure to mention Professor Gordon Snyder's blog at gordostuff.com. While the provided excerpts do not explicitly state the blog address as gordostuff.com, they are from "Gordon's STEM Blog". The blog post discusses the significant transformation in engineering education driven by the integration of artificial intelligence (AI) tools into the classroom. Professor Snyder, who has a long...

info_outline
Grokking: The Grokking: The "Aha!" Moment in Artificial Intelligence

Professor

This podcast episode from Gordon's STEM Blog explores the AI phenomenon called grokking, a term derived from Heinlein's work describing deep, intuitive understanding. Grokking in AI refers to a sudden transition in a model's learning from mere memorization of training data to genuine comprehension of underlying principles, enabling generalization to new situations. This "aha!" moment often occurs after a period of seemingly stalled progress, challenging the traditional assumption that plateauing performance indicates diminishing returns in training. The episode...

info_outline
Ten Minutes with OP-TEC Webmaster Ian Anderson show art Ten Minutes with OP-TEC Webmaster Ian Anderson

Professor

, OP-TEC, is a consortium of two-year colleges, high schools, universities, national laboratories, industry partners, and professional societies funded by the National Science Foundation’s Advanced Technological Education (ATE) program. The participating entities of OP-TEC have joined forces to create secondary-to-postsecondary as well as returning adult “pipelines” of highly qualified and strongly motivated students and to empower two-year colleges to prepare technicians in optics and photonics.

info_outline
Hacking Car Anti-collision Systems [19:08] show art Hacking Car Anti-collision Systems [19:08]

Professor

Hacking Car Anti-collision Systems, August 28, 2016 A group of researchers presenting at this month’s Def Con hacker conference showed how they were able to trick Tesla's sophisticated anti-collision sensors to make a car hit an object it would normally detect in its path. Before we start on the cars – you went to Def Con this year Mike – how was it? So let’s get to the cars now – who did this research? The group consisted of Chen Yan, a PhD student at Zhejiang University, Jianhao Liu, a senior security consultant at Qihoo 360, and Wenyuan Xu, a professor at...

info_outline
Lock It and Still Lose It [24:11] show art Lock It and Still Lose It [24:11]

Professor

Q: Could you tell us a little about how this research began? A: Actually in 2013 Flavio Garcia, a computer scientist at University of Birmingham, and a team of researchers were about to reveal a vulnerability in the ignition of Volkswagen cars that allowed them to start the car and drive off without a key. This vulnerability was present in millions of VWs. Q: You say “about to reveal”? A: Yes, they were sued, which delayed the publication of the work for 2 years. They used that time to continue their research into vulnerabilities with VW cars. Q: So did they find anything new? A: They sure...

info_outline
Intro To Pokemon Go [31:14] show art Intro To Pokemon Go [31:14]

Professor

References:  

info_outline
4K Ultra High Definition Television [22:37] show art 4K Ultra High Definition Television [22:37]

Professor

Title: 4K Ultra High Definition Television  Introduction High definition has meant 1080p (1,920 by 1,080) resolution for years now, and it's ready for an upgrade. That's where 4K, also called ultra high-definition, or UHD, television comes in. 4K is finally a mature, accessible technology. In this podcast we take a close look at UHD 4K technology referencing a PC Magazine post.   Updates  First some continued bad news on the security front … Businesses pay $100,000 to DDoS extortionists who never DDoS anyone – Dan Goodin Out-of-date apps put 3 million servers at risk of...

info_outline
Engineering Technology and Engineering Degrees – What is the Difference [20:30] show art Engineering Technology and Engineering Degrees – What is the Difference [20:30]

Professor

Questions we try to answer in the podcast:...

info_outline
FCC Spectrum Auction 2016 [32:00] show art FCC Spectrum Auction 2016 [32:00]

Professor

Intro ...

info_outline
What You Need to Know About Ransomware [32:04] show art What You Need to Know About Ransomware [32:04]

Professor

On March 31st, 2016 the US Computer Emergency Readiness Team or US-CERT released alert TA 16-091A titled “Ransomware and Recent Variants”. Ransomware is a type of malicious software that infects a computer and restricts users’ access to it until a ransom is paid to unlock it. Already in 2016, destructive ransomware variants such as Locky and Samas were observed infecting the computers of individuals and businesses – even hospitals and healthcare facilities. The purpose of this Alert is to provide further information on ransomware, its main characteristics, its...

info_outline
 
More Episodes

Hacking Car Anti-collision Systems, August 28, 2016

A group of researchers presenting at this month’s Def Con hacker conference showed how they were able to trick Tesla's sophisticated anti-collision sensors to make a car hit an object it would normally detect in its path.

Before we start on the cars – you went to Def Con this year Mike – how was it?

So let’s get to the cars now – who did this research?

The group consisted of Chen Yan, a PhD student at Zhejiang University, Jianhao Liu, a senior security consultant at Qihoo 360, and Wenyuan Xu, a professor at Zhejiang University and The University of South Carolina.

So can you give a quicker overview of what they did?

They discovered methods for "quieting" sensors to diminish or hide obstacles in a car's path, "spoofing" them to make an object appear farther or closer than it actually is, and jamming, which, Yan said, renders the sensor useless as it's "overwhelmed by noise."

Could this be done now? I mean, if someone is driving a Tesla or any other car with this kind of sensor technology, should they be concerned?

It's important to note that the demonstration was a proof-of-concept that did not mimic real-world conditions today. Researchers were working on cars that were usually stationary with what was sometimes very expensive equipment. They noted that the "sky wasn't falling."

But the experiment suggests that theoretically, a few years from now, somebody could make a device that could jam certain sensors in a nearby car.

Can you talk about these sensors a little more?

There are a number of sensors on a Tesla Model S that are used for a variety of functions. It has radar to detect objects in front of it, GPS for location tracking, and cameras to detect speed limit signs and lane markings, for example. As the talk showed, many of these things can be tricked by a determined attacker.

Is it just Tesla people need to be concerned about?

Much of their presentation focused on the Tesla Model S, but they also successfully jammed sensors on cars from Audi, Volkswagen, and Ford.

So what kinds of systems were they jamming?

Cars with ultrasonic sensors

Cars with parking assistance

The Tesla Model S with self-parking and summon

Let’s talk a little more about what they were able to demonstrate.

In a video demonstrating an attack, the researchers jammed sensors in the rear of the Model S, so the car did not know it was about to hit a person standing behind it. In another, they "spoofed" its Autopilot to trick it into thinking it would drive into something that was not actually there.

You mentioned they talked about using lasers – can you give any details?

They also used off-the-shelf lasers to defeat the onboard cameras, and, in one of the most low-tech demonstrations, they wrapped objects up in cheap black foam that rendered them invisible to the car's sensors.

What kind of feedback did they get from the manufacturers?

Yan said after the talk that Tesla reacted positively when they disclosed their research, and it was researching ways to mitigate these types of attacks. "They appreciated our work and are looking into this issue," he said.

So, in summary what are the auto makers concerned about after this presentation?

  • Realistic issues of automotive sensor security
  • Big threat to autonomous vehicles (present and future)
  • Attacks on ultrasonic sensors
  • Attacks on Millimeter Wave (MMW) Radars
  • Attacks on cameras
  • Attacks on self-driving cars

Where can people get the full Deaf Con presentation?

It's available at Def Con’s website https://media.defcon.org/DEF%20CON%2024/DEF%20CON%2024%20presentations/DEFCON-24-Liu-Yan-Xu-Can-You-Trust-Autonomous-Vehicles.pdf

Reference: http://www.businessinsider.com/defcon-tesla-jamming-spoofing-autopilot-2016-8