We performed a variety of real-world case studies on a real-world prototype system to demonstrate the effectiveness and feasibility of our novel attack architecture. Visit our Case Studies page to see more including time-synchronized videos.
We introduce MadRadar, a black-box attack framework for effective physical layer attacks on mmWave radars without prior knowledge of the victim radar's parameters (e.g., the chirp period and slope, and frame duration)
We enable new black-box attack types by improving upon existing methods for estimating victim parameters
We demonstrate that mmWave radars are vulnerable to false-negative and translation attacks that effectively 'remove' or 'move' detections of existing objects in the victim's point cloud, respectively;
We demonstrate feasibility, and evaluate our attacks on multiple real-world case studies performed using a real-time implementation on the USRP B210 SDR platform.
MadRadar stands for Malicious Attacks Designed for mmWave automotive FMCW radars, Visit the Project Overview page to learn more about automotive radars, the mmRAD attack architecture, and our novel false-negative and translation attacks.
David Hunt - Duke University
Kristen Angell - Duke University
Zhenzhou Qi - Duke University
Tiingjun Chen - Duke University
Miroslav Pajic - Duke University
Our paper can be accessed at this link: MadRadar paper .
Check out our MadRadar Git Repository!
Please see the contact information below for any further questions, clarifications, or inquiries