File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: All your GPS are belong to us: Towards stealthy manipulation of road navigation systems

TitleAll your GPS are belong to us: Towards stealthy manipulation of road navigation systems
Authors
Issue Date2018
Citation
Proceedings of the 27th Usenix Security Symposium, 2018, p. 1527-1544 How to Cite?
AbstractMobile navigation services are used by billions of users around globe today. While GPS spoofing is a known threat, it is not yet clear if spoofing attacks can truly manipulate road navigation systems. Existing works primarily focus on simple attacks by randomly setting user locations, which can easily trigger a routing instruction that contradicts with the physical road condition (i.e., easily noticeable). In this paper, we explore the feasibility of a stealthy manipulation attack against road navigation systems. The goal is to trigger the fake turn-by-turn navigation to guide the victim to a wrong destination without being noticed. Our key idea is to slightly shift the GPS location so that the fake navigation route matches the shape of the actual roads and trigger physically possible instructions. To demonstrate the feasibility, we first perform controlled measurements by implementing a portable GPS spoofer and testing on real cars. Then, we design a searching algorithm to compute the GPS shift and the victim routes in real time. We perform extensive evaluations using a trace-driven simulation (600 taxi traces in Manhattan and Boston), and then validate the complete attack via real-world driving tests (attacking our own car). Finally, we conduct deceptive user studies using a driving simulator in both the US and China. We show that 95% of the participants follow the navigation to the wrong destination without recognizing the attack. We use the results to discuss countermeasures moving forward.
Persistent Identifierhttp://hdl.handle.net/10722/363321

 

DC FieldValueLanguage
dc.contributor.authorZeng, Kexiong-
dc.contributor.authorLiu, Shinan-
dc.contributor.authorShu, Yuanchao-
dc.contributor.authorWang, Dong-
dc.contributor.authorLi, Haoyu-
dc.contributor.authorDou, Yanzhi-
dc.contributor.authorWang, Gang-
dc.contributor.authorYang, Yaling-
dc.date.accessioned2025-10-10T07:46:02Z-
dc.date.available2025-10-10T07:46:02Z-
dc.date.issued2018-
dc.identifier.citationProceedings of the 27th Usenix Security Symposium, 2018, p. 1527-1544-
dc.identifier.urihttp://hdl.handle.net/10722/363321-
dc.description.abstractMobile navigation services are used by billions of users around globe today. While GPS spoofing is a known threat, it is not yet clear if spoofing attacks can truly manipulate road navigation systems. Existing works primarily focus on simple attacks by randomly setting user locations, which can easily trigger a routing instruction that contradicts with the physical road condition (i.e., easily noticeable). In this paper, we explore the feasibility of a stealthy manipulation attack against road navigation systems. The goal is to trigger the fake turn-by-turn navigation to guide the victim to a wrong destination without being noticed. Our key idea is to slightly shift the GPS location so that the fake navigation route matches the shape of the actual roads and trigger physically possible instructions. To demonstrate the feasibility, we first perform controlled measurements by implementing a portable GPS spoofer and testing on real cars. Then, we design a searching algorithm to compute the GPS shift and the victim routes in real time. We perform extensive evaluations using a trace-driven simulation (600 taxi traces in Manhattan and Boston), and then validate the complete attack via real-world driving tests (attacking our own car). Finally, we conduct deceptive user studies using a driving simulator in both the US and China. We show that 95% of the participants follow the navigation to the wrong destination without recognizing the attack. We use the results to discuss countermeasures moving forward.-
dc.languageeng-
dc.relation.ispartofProceedings of the 27th Usenix Security Symposium-
dc.titleAll your GPS are belong to us: Towards stealthy manipulation of road navigation systems-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.scopuseid_2-s2.0-85066626539-
dc.identifier.spage1527-
dc.identifier.epage1544-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats