PowerBI Data Analyst - Create visualizations and dashboards from scratch
Get 35% Off CFI Certifications - Code CFI35
Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore the critical issue of GNSS spoofing and its impact on autonomous vehicles in this 26-minute Black Hat conference talk. Delve into the vulnerabilities of public Global Navigation System Satellites, which lack integrity mechanisms and are susceptible to spoofing attacks. Learn about the legal constraints surrounding GNSS spoofing assessment and the challenges of conducting vulnerability tests outside laboratory environments. Discover various attack methods, including offset, velocity, and halt attacks, as well as their potential consequences on autonomous vehicle systems. Gain insights into hardware and software components involved in GNSS spoofing, and understand key recommendations for mitigating these risks. Conclude with essential takeaways to enhance your understanding of this critical cybersecurity concern in the rapidly evolving field of autonomous transportation.
Syllabus
Introduction
What is GNSS
Low Power
Todd Humphries
Team Unicorn
Outline
Autonomous Vehicles
Whats Illegal
Hardware Outline
Software Outline
Offset Attack
Velocity Attack
Halt Attack
Recommendations
Key takeaways
Questions
Taught by
Black Hat