Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing (Extended Version)

For high-level Autonomous Vehicles (AV), localization is highly security and safety critical. One direct threat to it is GPS spoofing, but fortunately, AV systems today predominantly use Multi-Sensor Fusion (MSF) algorithms that are generally believed to have the potential to practically defeat GPS spoofing. However, no prior work has studied whether today's MSF algorithms are indeed sufficiently secure under GPS spoofing, especially in AV settings. In this work, we perform the first study to fill this critical gap. As the first study, we focus on a production-grade MSF with both design and implementation level representativeness, and identify two AV-specific attack goals, off-road and wrong-way attacks. To systematically understand the security property, we first analyze the upper-bound attack effectiveness, and discover a take-over effect that can fundamentally defeat the MSF design principle. We perform a cause analysis and find that such vulnerability only appears dynamically and non-deterministically. Leveraging this insight, we design FusionRipper, a novel and general attack that opportunistically captures and exploits take-over vulnerabilities. We evaluate it on 6 real-world sensor traces, and find that FusionRipper can achieve at least 97% and 91.3% success rates in all traces for off-road and wrong-way attacks respectively. We also find that it is highly robust to practical factors such as spoofing inaccuracies. To improve the practicality, we further design an offline method that can effectively identify attack parameters with over 80% average success rates for both attack goals, with the cost of at most half a day. We also discuss promising defense directions.

[1]  Jacob Cohen Statistical Power Analysis for the Behavioral Sciences , 1969, The SAGE Encyclopedia of Research Design.

[2]  Bernard Friedland,et al.  Control System Design: An Introduction to State-Space Methods , 1987 .

[3]  Sebastian Thrun,et al.  Probabilistic robotics , 2002, CACM.

[4]  Peter Biber,et al.  The normal distributions transform: a new approach to laser scan matching , 2003, Proceedings 2003 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2003) (Cat. No.03CH37453).

[5]  James J. Filliben,et al.  NIST/SEMATECH e-Handbook of Statistical Methods; Chapter 1: Exploratory Data Analysis , 2003 .

[6]  Bernhard Hofmann-Wellenhof,et al.  GNSS - Global Navigation Satellite Systems: GPS, GLONASS, Galileo, and more , 2007 .

[7]  Stefan Schaal,et al.  A Kalman filter for robust outlier detection , 2007, 2007 IEEE/RSJ International Conference on Intelligent Robots and Systems.

[8]  Sebastian Thrun,et al.  Map-Based Precision Vehicle Localization in Urban Environments , 2007, Robotics: Science and Systems.

[9]  T. Humphreys,et al.  Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer , 2008 .

[10]  Panagiotis Papadimitratos,et al.  GNSS-based Positioning: Attacks and countermeasures , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[11]  Bernhard Hofmann-Wellenhof,et al.  GNSS - Global Navigation Satellite Systems , 2008 .

[12]  A. Soloviev,et al.  Tight coupling of GPS, laser scanner, and inertial measurements for navigation in urban environments , 2008, 2008 IEEE/ION Position, Location and Navigation Symposium.

[13]  Sebastian Thrun,et al.  Robust vehicle localization in urban environments using probabilistic maps , 2010, 2010 IEEE International Conference on Robotics and Automation.

[14]  Emanuele Garone,et al.  False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).

[15]  Yilin Mo,et al.  False Data Injection Attacks in Control Systems , 2010 .

[16]  Ronen Lerner,et al.  Recent progress in road and lane detection: a survey , 2012, Machine Vision and Applications.

[17]  Gaurav S. Sukhatme,et al.  Visual-Inertial Sensor Fusion: Localization, Mapping and Sensor-to-Sensor Self-calibration , 2011, Int. J. Robotics Res..

[18]  Srdjan Capkun,et al.  On the requirements for successful GPS spoofing attacks , 2011, CCS '11.

[19]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[20]  David Brumley,et al.  GPS software attacks , 2012, CCS.

[21]  Weiyi Liu,et al.  Cyber Security Analysis for State Estimators in Air Traffic Control Systems , 2012 .

[22]  Gérard Lachapelle,et al.  GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques , 2012 .

[23]  Agus Budiyono,et al.  Principles of GNSS, Inertial, and Multi-sensor Integrated Navigation Systems , 2012 .

[24]  Dennis M. Akos,et al.  Who's Afraid of the Spoofer? GPS/GNSS Spoofing Detection via Automatic Gain Control (AGC) , 2012 .

[25]  Roland Siegwart,et al.  A robust and modular multi-sensor fusion approach applied to MAV navigation , 2013, 2013 IEEE/RSJ International Conference on Intelligent Robots and Systems.

[26]  Emilio Frazzoli,et al.  Synthetic 2D LIDAR for precise vehicle localization in 3D urban environment , 2013, 2013 IEEE International Conference on Robotics and Automation.

[27]  Mark Brown,et al.  Understanding the Presence of Experiential Learning Opportunity Programs in the Information Security Field , 2013, InfoSecCD.

[28]  Vincent Frémont,et al.  Mapping and localization using GPS, lane markings and proprioceptive sensors , 2013, 2013 IEEE/RSJ International Conference on Intelligent Robots and Systems.

[29]  Todd E. Humphreys,et al.  Unmanned Aircraft Capture and Control Via GPS Spoofing , 2014, J. Field Robotics.

[30]  Aboelmagd Noureldin,et al.  INS/GPS/LiDAR Integrated Navigation System for Urban and Indoor Environments Using Hybrid Scan Matching Algorithm , 2015, Sensors.

[31]  Yongdae Kim,et al.  Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors , 2015, USENIX Security Symposium.

[32]  Gyu-In Jee,et al.  GPS/DR Error Estimation for Autonomous Vehicle Localization , 2015, Sensors.

[33]  Sven Behnke,et al.  Registration with the Point Cloud Library: A Modular Framework for Aligning in 3-D , 2015, IEEE Robotics & Automation Magazine.

[34]  R. Katulski,et al.  Detection and Mitigation of GPS Spoofing Based on Antenna Array Processing , 2015 .

[35]  Jonathan Petit,et al.  Remote Attacks on Automated Vehicles Sensors : Experiments on Camera and LiDAR , 2015 .

[36]  Markus Schreiber,et al.  Vehicle localization with tightly coupled GNSS and visual odometry , 2016, 2016 IEEE Intelligent Vehicles Symposium (IV).

[37]  Jiming Chen,et al.  A Stealthy GPS Spoofing Strategy for Manipulating the Trajectory of an Unmanned Aerial Vehicle , 2016 .

[38]  Flavio D. Garcia,et al.  Lock It and Still Lose It - on the (In)Security of Automotive Remote Keyless Entry Systems , 2016, USENIX Security Symposium.

[39]  Emilio Frazzoli,et al.  A Survey of Motion Planning and Control Techniques for Self-Driving Urban Vehicles , 2016, IEEE Transactions on Intelligent Vehicles.

[40]  Hao Wu,et al.  Controlling UAVs with Sensor Input Spoofing Attacks , 2016, WOOT.

[41]  Todd E. Humphreys,et al.  GNSS Spoofing and Detection , 2016, Proceedings of the IEEE.

[42]  Chen Yan Can You Trust Autonomous Vehicles : Contactless Attacks against Sensors of Self-driving Vehicle , 2016 .

[43]  Srdjan Capkun,et al.  SPREE: a spoofing resistant GPS receiver , 2016, MobiCom.

[44]  R. Piché Online tests of Kalman filter consistency , 2016 .

[45]  Fabian de Ponte Müller,et al.  Survey on Ranging Sensors and Cooperative Techniques for Relative Positioning of Vehicles , 2017, Sensors.

[46]  Joan Solà,et al.  Quaternion kinematics for the error-state Kalman filter , 2015, ArXiv.

[47]  Todd E. Humphreys,et al.  Hostile Control of Ships via False GPS Signals: Demonstration and Detection , 2017 .

[48]  Germán Ros,et al.  CARLA: An Open Urban Driving Simulator , 2017, CoRL.

[49]  Sangjun Lee,et al.  Attack-aware multi-sensor integration algorithm for autonomous vehicle navigation systems , 2017, 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

[50]  Wenyuan Xu,et al.  WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).

[51]  Robert C. Qiu,et al.  False Data Injection Attacks against State Estimation , 2017 .

[52]  Marco Vieira,et al.  Software Metrics as Indicators of Security Vulnerabilities , 2017, 2017 IEEE 28th International Symposium on Software Reliability Engineering (ISSRE).

[53]  Ho Gi Jung,et al.  Sensor Fusion-Based Low-Cost Vehicle Localization System for Complex Urban Environments , 2017, IEEE Transactions on Intelligent Transportation Systems.

[54]  Zhe Zhang,et al.  PIRVS: An Advanced Visual-Inertial SLAM System with Flexible Sensor Fusion and Hardware Co-Design , 2017, 2018 IEEE International Conference on Robotics and Automation (ICRA).

[55]  Shinpei Kato,et al.  Autoware on Board: Enabling Autonomous Vehicles with Embedded Systems , 2018, 2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS).

[56]  Teodor Tomic,et al.  Robust Visual-Inertial State Estimation with Multiple Odometries and Efficient Mapping on an MAV with Ultra-Wide FOV Stereo Vision , 2018, 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).

[57]  Gang Wang,et al.  All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems , 2018, USENIX Security Symposium.

[58]  Lashika Medagoda,et al.  Robust Model-Aided Inertial Localization for Autonomous Underwater Vehicles , 2018, 2018 IEEE International Conference on Robotics and Automation (ICRA).

[59]  Christoph Stiller,et al.  Precise Localization in High-Definition Road Maps for Urban Regions , 2018, 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).

[60]  Guoquan Huang,et al.  Asynchronous Multi-Sensor Fusion for 3D Mapping and Localization , 2018, 2018 IEEE International Conference on Robotics and Automation (ICRA).

[61]  Roland Siegwart,et al.  GOMSF: Graph-Optimization Based Multi-Sensor Fusion for robust UAV Pose estimation , 2018, 2018 IEEE International Conference on Robotics and Automation (ICRA).

[62]  Martin Brossard,et al.  Unscented Kalman Filter on Lie Groups for Visual Inertial Odometry , 2018, 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).

[63]  Wen-Chuan Lee,et al.  Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach , 2018, CCS.

[64]  Dawn Song,et al.  Physical Adversarial Examples for Object Detectors , 2018, WOOT @ USENIX Security Symposium.

[65]  Insup Lee,et al.  Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors , 2018, USENIX Security Symposium.

[66]  Tor Arne Johansen,et al.  Robust and Secure UAV Navigation Using GNSS, Phased-Array Radio System and Inertial Sensor Fusion , 2018, 2018 IEEE Conference on Control Technology and Applications (CCTA).

[67]  Jens B. Schmitt,et al.  Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks , 2018, 2018 IEEE Symposium on Security and Privacy (SP).

[68]  Hao Wang,et al.  Robust and Precise Vehicle Localization Based on Multi-Sensor Fusion in Diverse City Scenes , 2017, 2018 IEEE International Conference on Robotics and Automation (ICRA).

[69]  Hendry Ferreira Chame,et al.  Reliable fusion of black-box estimates of underwater localization , 2018, 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).

[70]  Raquel Urtasun,et al.  End-to-end Learning of Multi-sensor 3D Tracking by Detection , 2018, 2018 IEEE International Conference on Robotics and Automation (ICRA).

[71]  Atul Prakash,et al.  Robust Physical-World Attacks on Deep Learning Visual Classification , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[72]  Renaud Dubé,et al.  Redundant Perception and State Estimation for Reliable Autonomous Racing , 2019, 2019 International Conference on Robotics and Automation (ICRA).

[73]  Hyun Chul Roh,et al.  Complex urban dataset with multi-level sensors from highly diverse urban environments , 2019, Int. J. Robotics Res..

[74]  Guoquan Huang,et al.  Visual-Inertial Localization With Prior LiDAR Map Constraints , 2019, IEEE Robotics and Automation Letters.

[75]  Marilyn Wolf,et al.  False data injection attacks , 2019, Cloud Control Systems.

[76]  Eren Allak,et al.  Covariance Pre-Integration for Delayed Measurements in Multi-Sensor Fusion , 2019, 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).

[77]  Mathieu Joerger,et al.  Efficient Integrity Monitoring for KF-based Localization , 2019, 2019 International Conference on Robotics and Automation (ICRA).

[78]  Graham Mills,et al.  Localization Requirements for Autonomous Vehicles , 2019, SAE International Journal of Connected and Automated Vehicles.

[79]  Dimitrios Kanoulas,et al.  Outlier-Robust State Estimation for Humanoid Robots* , 2019, 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).

[80]  Ivan Martinovic,et al.  Losing the Car Keys: Wireless PHY-Layer Insecurity in EV Charging , 2019, USENIX Security Symposium.

[81]  Yong Liu,et al.  LIC-Fusion: LiDAR-Inertial-Camera Odometry , 2019, 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).

[82]  Mayank Bansal,et al.  ChauffeurNet: Learning to Drive by Imitating the Best and Synthesizing the Worst , 2018, Robotics: Science and Systems.

[83]  Ruigang Liang,et al.  Seeing isn't Believing: Towards More Robust Adversarial Attack Against Real World Object Detectors , 2019, CCS.

[84]  Matthew Johnson-Roberson,et al.  Localization and Tracking of Uncontrollable Underwater Agents: Particle Filter Based Fusion of On-Body IMUs and Stationary Cameras , 2019, 2019 International Conference on Robotics and Automation (ICRA).

[85]  Ali Dehghantanha,et al.  A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks , 2019, IEEE Transactions on Emerging Topics in Computing.

[86]  Guevara Noubir,et al.  Security of GPS/INS Based On-road Location Tracking Systems , 2018, 2019 IEEE Symposium on Security and Privacy (SP).

[87]  Guoquan Huang,et al.  Multi-Camera Visual-Inertial Navigation with Online Intrinsic and Extrinsic Calibration , 2019, 2019 International Conference on Robotics and Automation (ICRA).

[88]  Martin Brossard,et al.  Learning Wheel Odometry and IMU Errors for Localization , 2019, 2019 International Conference on Robotics and Automation (ICRA).

[89]  Kevin Fu,et al.  Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving , 2019, CCS.

[90]  Dragomir Anguelov,et al.  VectorNet: Encoding HD Maps and Agent Dynamics From Vectorized Representation , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[91]  Ningfei Wang,et al.  Security of Deep Learning based Lane Keeping System under Physical-World Adversarial Attack , 2020, ArXiv.

[92]  Jairo Giraldo,et al.  SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants , 2020, USENIX Security Symposium.

[93]  Taxonomy and definitions for terms related to driving automation systems for on-road motor vehicles , 2022 .