美国人看中国

美媒:中国黑客低成本入侵特斯拉model s

 “来自中国的精英黑客已经找到了一种方法,可以通过在路上放置一些简单的贴纸来诱骗特斯拉Model S进入错误的车道”–福布斯网

美媒:中国黑客入侵特斯拉model s

特斯拉概念车型图

 

福布斯网站报道截图

 

《Hackers Use Little Stickers To Trick Tesla Autopilot Into The Wrong Lane》 (Forbes)
《黑客使用小贴纸欺骗特斯拉自动驾驶进入错误的车道》(美国 福布斯杂志)

 

Elite hackers from China have found a way to trick a Tesla Model S into going into the wrong lane by strategically placing some simple stickers on the road. 来自中国的精英黑客已经找到了一种方法,可以通过战略性地在路上放置一些简单的贴纸来诱骗特斯拉Model S进入错误的车道。

 

Keen Labs, widely regarded as one of the most technically ingenious cybersecurity research groups in the world, developed two kinds of attack to mess with the Tesla autopilot’s lane-recognition tech. Keen Labs被广泛认为是世界上技术最为巧妙的网络安全研究组织之一,它开发了两种攻击方式,以捣乱特斯拉自动驾驶仪的车道识别技术。

 

So the researchers tried to create a “fake lane.” They discovered that Tesla’s autopilot would detect a lane where there were just three inconspicuous tiny squares strategically placed on the road. When they left small stickers at an intersection, the hackers believed they would trick the Tesla into thinking the patches marked out the continuation of the right lane. On a test track, their theory was proved correct, as the autopilot took the car into the real left lane. 因此,研究人员试图制造一条“假车道”。他们发现特斯拉的自动驾驶仪会发现一条车道,路上只有三个不显眼的小方块。当他们在十字路口留下小贴纸时,黑客们相信他们会欺骗特斯拉,让他们认为这些贴片标出了右边车道的延续。在试车道上,他们的理论证明是正确的,因为自动驾驶仪将赛车带入真正的左车道。

 

“Our experiments proved that this architecture has security risks and reverse-lane recognition is one of the necessary functions for autonomous driving in non-closed roads,” the Keen Labs wrote in a paper. “In the scene we build, if the vehicle knows that the fake lane is pointing to the reverse lane, it should ignore this fake lane and then it could avoid a traffic accident.” “我们的实验证明,这种架构具有安全风险,反向车道识别是非封闭道路自动驾驶的必要功能之一,”Keen Labs在一篇论文中写道。“在我们建造的场景中,如果车辆知道假车道指向反向车道,它应该忽略这条假车道,然后它可以避免交通事故。”

 

In other attacks, the Keen crew claimed to have the ability to remotely control the steering wheel and start up the windscreen wipers. In the former, via a complex series of steps that broke through some of the security barriers put up around the onboard network, Keen discovered a way to control the steering wheel with a gamepad, though they were in the vehicle at the time. While that initially sounds serious, the attack didn’t work when a car had been taken manually from reverse to drive mode at any speed above 8 km per hour. However, when in cruise control, the attack worked “without limitations.” 在其他攻击事件中,Keen船员声称能够远程控制方向盘并启动挡风玻璃刮水器。在前者中,通过一系列复杂的步骤突破了车载网络周围的一些安全屏障,Keen发现了一种用游戏手柄控制方向盘的方法,尽管他们当时在车上。虽然最初听起来很严重,但是当车辆以任何超过8公里/小时的速度从反向行驶到驾驶模式时,攻击不起作用。但是,在巡航控制中,攻击“无限制”。

 

As for the windscreen hack, it’d be tricky, in a real-world scenario, to deploy the specially-crafted image that fooled the Tesla into believing it was raining. But the fake lane would be easy to recreate using cheap materials, Keen Labs said. 至于挡风玻璃黑客,在现实世界的场景中,部署特制的图像会让特斯拉误以为它正在下雨,这一点非常棘手。Keen Labs说,但使用便宜的材料很容易重建假车道。

 

Tesla hadn’t responded to a request for comment at the time of publication. 截止发稿时,特斯拉没有作任何回复。

 

“ 贴纸:这锅不背 ”

本文由外评网翻译整理,不代表外评网立场,所有言论仅代表其个人观点。欢迎转载,请保留出处:https://www.waiping.net/us/chinese-hackers-trick-tesla-model-s/

回到顶部