The frustum attack was conceived as a black-box method of retaining consistency of LiDAR spoofing attacks between camera and LiDAR sensor data.
The frustum attack has demonstrated ability to compromise both LiDAR-only and camera-LiDAR fusion across 6 different perception architectures, including point-based, voxel-based, and bird's-eye-view LiDAR-only architectures and cascaded semantic, integrated semantic, and feature-level camera-LiDAR fusion architectures.
The frustum attack has currently been shown stealthy against CARLO, SVF, and ShadowCatcher defenses. It also suggests to be stealthy to LIFE, as reported in the original work.
Cascaded Semantic Fusion
Integrated Semantic Fusion (e.g. Tracking)
Feature-Level Fusion
TOP: Attacker spoofs LiDAR points in frustum when victim and target have no relative velocity. Attacker has full control over range of placement
BOTTOM: Attacker executes spoof during relative motion between victim and target vehicles. Attacker is able to maintain a consistent placement of spoof points relative to target vehicle.
AV control compromised: frustum attack causes emergency braking
Frustum attack causes false positive detections for Apollo
Find early access to our full work here:
Hallyburton, R. S., Liu, Y., Cao, Y., Mao, Z. M., & Pajic, M. (2021). Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles. arXiv preprint arXiv:2106.07098.