On the Realism of LiDAR Spoofing Attacks against Autonomous Driving Vehicle at High Speed and Long Distance
Takami Sato
Network and Distributed System Security (NDSS) Symposium 2025 · Day 3 · Autonomous Vehicles
This talk, presented by Rio Suzuki from Ko University and based on joint work with Professor Alfred and Takami Sato from UCI, delves into the critical security vulnerabilities of **LiDAR** (Light Detection and Ranging) systems in autonomous vehicles (AVs). The core focus is on demonstrating the realism and severe consequences of LiDAR **spoofing attacks**—specifically, **removal attacks**—against moving AVs at high speeds and long distances. These attacks aim to either inject non-existent objects into the AV's perception or, more dangerously, remove actual obstacles from its view, potentially leading to catastrophic collisions.
AI review
Solid, technically grounded research that meaningfully advances the LiDAR spoofing literature by moving from lab-bench stationary setups to real-world, high-speed, long-distance attacks against an integrated AV stack. The pulse fingerprinting bypass is the headline contribution — it's not a theoretical flaw, they built hardware to exploit it and drove a car into something to prove the point.