Keywords: tesla, automatic driving, sensor
See distant things, in fact has been in our life to mimic a general outline. Although similar "jarvis" intelligent housekeeper (iron man), using voice can fully control the popularity of the household life has not been very widely, but a lot of intelligent applications have dominated the flow a lot of time in our lives.
Back, for example, automatic warehousing, perception around obstacles for the car now, how is not a fresh skills. Never leave home, through the intelligent water power grid system, online payment has become the daily life in various expense; In addition to consumer equipment has obtained the development, in the manufacturing, mining, utilities and agricultural industry of large asset, smart devices are beginning to widely used.
But the problem is that many intelligent products in terms of security is very fragile. Reporter called "HACKPWN2016" security geek in the carnival, just to see a lot of China's geek higher-ups from all aspects of the hard and software of products for the cracking.
Automated driving technology, the need to use sensors to the surrounding environment, data range, based on the surrounding environment and the data path planning, automatic driving condition to form. And feedback information can also be displayed in the human-computer interaction interface, gives the driver driving the basis of a judgment.
Basic by the function of the sensor, ultrasonic sensor measurement short-range, hd camera identification sign, and LiDAR to generate 3 d map, radar detection distance. And cracking, is attacks on the above sensors, generated the wrong input source, and thus affect the driver's judgment.
Tesla, for example, is made up of a millimeter wave radar, a high-definition camera, 12 ultrasonic sensors of perception of it. Tesla automated driving accident in the United States, tesla for white color recognition of trucks is correct, but cannot distinguish different from pavement, and radar wave also happens to be through the area, causing the tesla directly under the drill into the truck.
Not only is the tesla, the mainstream of the car is equipped with a sensor, the current market is vulnerable to malicious attacks. Professor wen-yuan xu and his team from zhejiang university, in selling a few cars on the market for the show. Reporters on the scene to see in the demonstration, from different parts have some holes, such as:
For ultrasonic sensors, the use of interference source equipment, can be hidden obstacles, let lose the ability of normal detection, sensor with an obstacle can also be generated illusion, let the car stop moving in a flash;
On taobao can buy some new material, also can form the stealth effect of sensor;
By using the method of interference sources, also can let lose working effect, millimeter wave radar for monitoring vehicle driving path deviation;
And for a camera lost function, only need is laser pen.
"Speak so much, not to let everyone not to buy auto vehicle", wen-yuan xu explained, "but in our design automatic driving vehicle, especially when the sensor, the designer should consider consciously attack, these scenarios are considered. For we buy a car, the automatic vehicle can buy, but it haven't reach the real automated driving."
In addition to the car, a lot of equipment under high frequency usage scenarios, are a geek big coffee break easily. By means of attack transport protocol, such as a parallel access mechanism, tamper with the robot to reply to the question; Leaky key generation mechanism, crack remote car rolling code; Embedded mobile phone virus, can seamlessly in PC and mobile terminal, the quick cross infection; 20 seconds cracking win 10, remote control desktop window...
Data group (IDG had predicted that the Internet of things market will reach 1.7 trillion in 2020, the global Internet access to the terminal will reach 50 billion. Whereas Gartner predicts 2020, the Internet of things of the black market will exceed $5 billion.
The vigorous development of the Internet of things, also led to the gray market and technology upgrade, users in the security, the lack of common sense and in new technologies to protect themselves before the threshold is too high, let the infringement in the field of intelligent becoming more secretive and huge.
Just think, how many people will be examined to see intelligent device statement clause? Or who can perceive that a Trojan virus to steal personal information continuously in the smart devices? 360 founder CEO zhou also at this year's network security in a speech in the meeting said, "do business for 11 years, the most helpless or domestic enterprises disregard" for network security.
When the wheel of science and technology and social progress came to a comprehensive upgrade of the threshold, the pursuit of more convenient, more comfortable life, more like a deeply rooted in human destiny in gene, but the technology itself is a double-edged sword, no one will want to abandon security in obtain convenient at the same time.