Python, Prompt Engineering, Data Science — Build the Skills Employers Want Now
The Private Equity Associate Certification
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the critical issue of GNSS spoofing and its impact on autonomous vehicles in this 26-minute Black Hat conference talk. Delve into the vulnerabilities of public Global Navigation System Satellites, which lack integrity mechanisms and are susceptible to spoofing attacks. Learn about the legal constraints surrounding GNSS spoofing assessment and the challenges of conducting vulnerability tests outside laboratory environments. Discover various attack methods, including offset, velocity, and halt attacks, as well as their potential consequences on autonomous vehicle systems. Gain insights into hardware and software components involved in GNSS spoofing, and understand key recommendations for mitigating these risks. Conclude with essential takeaways to enhance your understanding of this critical cybersecurity concern in the rapidly evolving field of autonomous transportation.
Syllabus
Introduction
What is GNSS
Low Power
Todd Humphries
Team Unicorn
Outline
Autonomous Vehicles
Whats Illegal
Hardware Outline
Software Outline
Offset Attack
Velocity Attack
Halt Attack
Recommendations
Key takeaways
Questions
Taught by
Black Hat