Overview
Explore the vulnerabilities of GPS and INS-based location tracking systems for road transportation in this IEEE conference talk. Delve into algorithms that enable adversaries to travel to alternate locations undetected, despite INS-aided GPS monitoring. Examine the construction of graph models for road networks and the generation of spoofed routes that render gyroscope and accelerometer sensors ineffective. Learn about a real-time integrated GPS/INS spoofer that accounts for traffic conditions and dynamically generates spoofing signals. Analyze experimental results from ten different cities, revealing the potential for attackers to reach destinations up to 30 km away without detection. Discover proposed countermeasures to limit adversarial capabilities without hardware modifications. Gain insights into the security challenges facing location-based systems and potential solutions for enhancing their resilience against sophisticated attacks.
Syllabus
Intro
Contributions
High-level Attack Overview
A Visual Representation
Graph Construction
Intuition for Spoof Routes Generation
Spoof Routes Generation Algorithm
Intuition for Escape Routes Generation
Escape Routes Generation Algorithm
Real World Spoofer Evaluation
Evaluation Methodology
Maximum Displacement from Intended Destination
Estimated Coverage Area of Escape Routes
Countermeasure. Secure Paths Algorithm
Summary & Questions?
Taught by
IEEE Symposium on Security and Privacy