Legal GNSS Spoofing and Its Effects on Autonomous Vehicles
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the critical issue of GNSS spoofing and its impact on autonomous vehicles in this 26-minute Black Hat conference talk. Delve into the vulnerabilities of public Global Navigation System Satellites, which lack integrity mechanisms and are susceptible to spoofing attacks. Learn about the legal constraints surrounding GNSS spoofing assessment and the challenges of conducting vulnerability tests outside laboratory environments. Discover various attack methods, including offset, velocity, and halt attacks, as well as their potential consequences on autonomous vehicle systems. Gain insights into hardware and software components involved in GNSS spoofing, and understand key recommendations for mitigating these risks. Conclude with essential takeaways to enhance your understanding of this critical cybersecurity concern in the rapidly evolving field of autonomous transportation.
Syllabus
Introduction
What is GNSS
Low Power
Todd Humphries
Team Unicorn
Outline
Autonomous Vehicles
Whats Illegal
Hardware Outline
Software Outline
Offset Attack
Velocity Attack
Halt Attack
Recommendations
Key takeaways
Questions
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube