<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Tesla Model X - Intellope</title>
	<atom:link href="https://www.intellope.com/tag/tesla-model-x/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.intellope.com/tag/tesla-model-x/</link>
	<description></description>
	<lastBuildDate>Sun, 27 Jun 2021 10:29:24 +0000</lastBuildDate>
	<language>sk-SK</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.1.10</generator>

<image>
	<url>https://www.intellope.com/wp-content/uploads/2020/05/cropped-erb-intellope-white-32x32.png</url>
	<title>Tesla Model X - Intellope</title>
	<link>https://www.intellope.com/tag/tesla-model-x/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Tesla’s GhostBusters vs. Hackers: Projections that pose a threat</title>
		<link>https://www.intellope.com/teslas-ghostbusters-vs-hackers-projections-that-pose-a-threat/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=teslas-ghostbusters-vs-hackers-projections-that-pose-a-threat</link>
					<comments>https://www.intellope.com/teslas-ghostbusters-vs-hackers-projections-that-pose-a-threat/#comments</comments>
		
		<dc:creator><![CDATA[Vasil Dzadik]]></dc:creator>
		<pubDate>Thu, 17 Jun 2021 09:51:24 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[GhostBusters]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Tesla]]></category>
		<category><![CDATA[Tesla Model X]]></category>
		<guid isPermaLink="false">https://www.intellope.com/?p=3831</guid>

					<description><![CDATA[<p>Recently, the gap in advanced driver-assistance systems has been used by hackers. Cyber attacks can be applied through advertisements and cause ADAS to trigger a reaction.</p>
<p>The post <a href="https://www.intellope.com/teslas-ghostbusters-vs-hackers-projections-that-pose-a-threat/">Tesla’s GhostBusters vs. Hackers: Projections that pose a threat</a> first appeared on <a href="https://www.intellope.com">Intellope</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Would you consider the projection of the gentleman real? Well, as shown on the right corner of the picture, the Telsa Model X would.</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img decoding="async" width="338" height="340" src="https://www.intellope.com/wp-content/uploads/2021/06/tesla-ghostbusters-vs-hackers-intellope-1.png" alt="" class="wp-image-3824" srcset="https://www.intellope.com/wp-content/uploads/2021/06/tesla-ghostbusters-vs-hackers-intellope-1.png 338w, https://www.intellope.com/wp-content/uploads/2021/06/tesla-ghostbusters-vs-hackers-intellope-1-298x300.png 298w, https://www.intellope.com/wp-content/uploads/2021/06/tesla-ghostbusters-vs-hackers-intellope-1-150x150.png 150w" sizes="(max-width: 338px) 100vw, 338px" /></figure></div>



<p>Would you speed down the highway after seeing this speed sign projected on the tree? I suppose you probably won’t. Surprisingly, as shown on the left side of the picture, the Tesla Model X would. </p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img decoding="async" loading="lazy" width="257" height="340" src="https://www.intellope.com/wp-content/uploads/2021/06/teslas-ghostbusters-vs-hackers-2.png" alt="" class="wp-image-3826" srcset="https://www.intellope.com/wp-content/uploads/2021/06/teslas-ghostbusters-vs-hackers-2.png 257w, https://www.intellope.com/wp-content/uploads/2021/06/teslas-ghostbusters-vs-hackers-2-227x300.png 227w" sizes="(max-width: 257px) 100vw, 257px" /></figure></div>



<p>Do those facts pose a problem or any kind of danger? They surely do.</p>



<h2>&#8222;Phantom&#8220; objects and signs</h2>



<p>A phantom is defined as a depthless visual object. Even though this object doesn’t have a 3D dimension (they don’t pose a threat to the driver), a &#8222;better safe than sorry&#8220; policy of the assistance system considers them to be real. This leads to applying the brakes immediately and causing havoc on the road. A phantom object can be created by a projector or be presented via a digital screen (e.g., billboard). The signs (speed sign, stop sign, etc.) are being recognized, even if they appear for a few milliseconds – split-second phantoms.</p>



<h2>Split-Second Phantom Attack</h2>



<p>Recently, the gap in advanced driver-assistance systems has been used by hackers. Cyber attacks can be applied through advertisements and cause ADAS to trigger a reaction. Attackers use an algorithm to hide a phantom in a random advertisement. Phantom attacks are really tricky. They can be applied remotely and do not leave any evidence at the attack scene. Moreover, they don’t require any special expertise, complex preparation, or expensive equipment.</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img decoding="async" loading="lazy" width="600" height="338" src="https://www.intellope.com/wp-content/uploads/2021/06/hamburger-intellope-stop.gif" alt="" class="wp-image-3828"/><figcaption>The phantom appears for just 125 ms.</figcaption></figure></div>



<h2>GhostBusters</h2>



<p>Luckily, researchers are one step ahead. They came up with a detector that doesn’t require any additional changes to be made to the existing infrastructure. &#8222;It consists of four lightweight deep CNNs that assess the realism and authenticity of an object by examining the object’s reflected light, context, surface, and depth&#8220; a research paper from Ben-Gurion University of the Negevsay states. The ongoing research might limit the opportunities for attackers to apply phantom attacks but won’t eliminate them.</p>



<p><em><sub>Source: https://dl.acm.org/doi/10.1145/3372297.3423359</sub></em></p><p>The post <a href="https://www.intellope.com/teslas-ghostbusters-vs-hackers-projections-that-pose-a-threat/">Tesla’s GhostBusters vs. Hackers: Projections that pose a threat</a> first appeared on <a href="https://www.intellope.com">Intellope</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.intellope.com/teslas-ghostbusters-vs-hackers-projections-that-pose-a-threat/feed/</wfw:commentRss>
			<slash:comments>19</slash:comments>
		
		
			</item>
	</channel>
</rss>
