ArXiv TLDR

SoK: The Next Frontier in AV Security: Systematizing Perception Attacks and the Emerging Threat of Multi-Sensor Fusion

🐦 Tweet
2604.20621

Shahriar Rahman Khan, Tariqul Islam, Raiful Hasan

cs.CR

TLDR

This SoK systematizes 48 perception attacks on AVs, highlighting emerging multi-sensor fusion threats and critical research gaps.

Key contributions

  • Systematizes 48 peer-reviewed studies on perception-layer attacks against autonomous vehicles.
  • Presents a unified taxonomy of 20 attack vectors, categorized by sensor, stage, medium, and module.
  • Reveals underexplored vulnerabilities in multi-sensor fusion logic and cross-sensor dependencies.
  • Identifies critical research gaps, including limited real-world testing and defense limitations.

Why it matters

This paper is crucial as it highlights a fundamental shift in AV security, where attackers exploit multi-sensor redundancy meant for safety. It systematizes existing threats and identifies critical gaps, guiding future research toward robust, fusion-aware defense designs for trustworthy autonomous systems.

Original Abstract

Autonomous vehicles (AVs) increasingly rely on multi-sensor perception pipelines that combine data from cameras, lidar, radar, and other modalities to interpret the environment. This SoK systematizes 48 peer-reviewed studies on perception-layer attacks against AVs, tracking the field's evolution from single-sensor exploits to complex cross-modal threats that compromise multi-sensor fusion (MSF). We develop a unified taxonomy of 20 attack vectors organized by sensor type, attack stage, medium, and perception module, revealing patterns that expose underexplored vulnerabilities in fusion logic and cross-sensor dependencies. Our analysis identifies key research gaps, including limited real-world testing, short-term evaluation bias, and the absence of defenses that account for inter-sensor consistency. To illustrate one such gap, we validate a fusion-level vulnerability through a proof-of-concept simulation combining infrared and lidar spoofing. The findings highlight a fundamental shift in AV security: as systems fuse more sensors for robustness, attackers exploit the very redundancy meant to ensure safety. We conclude with directions for fusion-aware defense design and a research agenda for trustworthy perception in autonomous systems.

📬 Weekly AI Paper Digest

Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.