The Invisible Danger: ADAS Attacks via Infrared Light

March 31, 2023
CyberThreat Research Lab
The Invisible Danger: ADAS Attacks via Infrared Light

The demand for advanced driver assistance systems (ADASs) — technologies that aid in monitoring, warning, braking, and steering tasks — is expected to increase over the next decade. Unfortunately, cybercriminals will also look for opportunities in the form of security gaps and will attempt to exploit the same technologies that make ADASs beneficial in protecting drivers and reducing accidents on the road.

In this blog entry, we discuss two attack scenarios that demonstrate how infrared (IR) laser technology can be exploited by malicious actors to interfere with ADASs and mislead a vehicle to execute incorrect or even dangerous actions.

ADASs defined

ADASs are electronic systems in a vehicle that use cameras and other sensors to help the driver drive safely. These systems give the driver warnings, automatically apply the brakes, or adjust the speed to prevent accidents. Examples of ADAS components include sensors that detect objects around the car, cameras that show the view behind it, and warnings for lane drifting or cars in a driver’s blind spot. Overall, ADASs can help make driving safer and prevent accidents.

Cameras as an essential part of ADASs

Cameras play an important role in ADASs as they provide a real-time view of the vehicle’s surroundings. They capture video images that the ADAS software analyzes to detect objects such as other vehicles, pedestrians, or obstacles in the car’s path. Many cameras used in ADASs are designed to capture both visible and IR light. This makes cameras effective in enhancing vehicle perception even in low-light conditions.

Attack scenarios

While cameras in vehicles can detect IR light (which falls outside the visible range for humans), this capability could also become a potential vulnerability. An attacker could flood a camera’s sensor with powerful IR radiation, causing it to saturate and produce unusable images, and ultimately rendering the camera ineffective. But the danger doesn’t stop there. An attacker could also project IR light onto a road sign, causing a vehicle’s perception system to misinterpret the sign.

Such attacks could lead to incorrect or even dangerous actions by the vehicle. It’s worth noting that these attacks are more likely to target autonomous vehicles, which, unlike human-driven vehicles, rely heavily on perception systems.

Projecting IR light toward cameras

During the ACM Conference on Computer and Communications Security (CCS) 2021, the researchers Wei Wang, Yao Yao, Xin Liu, Xiang Li, Pei Hao, and Ting Zhu demonstrated a novel attack method that exposed vehicle cameras’ potential vulnerabilities. The vulnerability highlighted in their research, which involves projecting IR light toward cameras, affects various types of autonomous vehicles, including Tesla’s, and can be exploited using IR light with wavelengths ranging from 780 to 850 nanometers. This security challenge, dubbed I-Can-See-the-Light (ICSL) Attack by the researchers, can be used to create fake traffic signals, alter a vehicle’s environment perception, or even blind a camera.

Projecting IR light onto road signs

During the Symposium on Vehicle Security and Privacy (VehicleSec) 2023, the researchers Takami Sato, Sri Hrushikesh Varma Bhupathiraju, Michael Clifford, Takeshi Sugawara, Qi Alfred Chen, and Sara Rampazz provided experimental evidence to show that projecting IR light onto road signs could indeed affect vehicles. They conducted their experiments using a camera and a projector to simulate an IR alteration attack. They found that projecting IR light onto a road sign could cause the perception system to misinterpret the sign, leading to incorrect or potentially dangerous actions by the vehicle.

Hidden risks

In both attack scenarios, whether the attacker projects IR light directly toward a camera or onto a road sign, the camera of the vehicle is affected, causing it to misinterpret its surroundings. This introduces risks such as making the vehicle stop unexpectedly, potentially causing traffic jams or accidents, and ruining the in-car user experience by blinding AV cameras. Additionally, an attacker could introduce simultaneous localization and mapping (SLAM) errors by deploying multiple IR light sources on the road.

Attacks such as those discussed in this article can compromise the safety and reliability of autonomous vehicles, and thus highlight the importance of having robust cybersecurity measures in place to safeguard them.

To read more research on other possible vulnerabilities in connected vehicles and learn best security practices, visit our resource center.

Our News and Views

Gain Insights Into Automotive Cybersecurity

  • Pwn2Own Automotive 2026 Day 3: New Master of Pwn Announced and Other Highlights
    Blog
    January 26, 2026
    Pwn2Own Automotive 2026 set a new record with 76 unique zero-day vulnerabilities discovered, exposing the rapidly expanding attack surface across SDVs, IVI systems, and EV charging infrastructure. The final day crowned Fuzzware.io as Master of Pwn 2026, with 28 Master of Pwn points.
    Read More
  • Pwn2Own Automotive 2026 Day 2: EV Chargers Hit Full Throttle
    Blog
    January 23, 2026
    Day 2 delivered 29 new zero-days, pushing the total to a record 66. Researchers repeatedly compromised Level 2/3 EV chargers and IVI systems using practical flaws like exposed interfaces and command injection. The takeaway: automotive and charging infrastructure attacks are now repeatable at scale—shifting cyber risk from theoretical to immediate operational impact.
    Read More
  • Pwn2Own Automotive 2026: Uncovering 37 Unique Zero-Days
    Blog
    January 22, 2026
    Pwn2Own Automotive 2026 Day 1 opened with record-breaking momentum, with researchers successfully compromising infotainment systems, EV chargers, and Tesla interfaces—highlighting how expansive today’s automotive attack surface has become. The surge in entries and chained exploits confirms a clear shift: in the SDV era, automotive cyber risk is no longer isolated to the vehicle, but systemic across the entire ecosystem.
    Read More
  • Pwn2Own Automotive 2026: Turning Zero-Day Discovery into Automotive Foresight
    Blog
    January 15, 2026
    Pwn2Own Automotive 2026 exposes critical zero-day vulnerabilities in software-defined vehicles before they escalate into real-world business and operational risk. By ensuring zero-day vulnerabilities move from exposure to resolution, the event transforms discovery into Automotive Foresight—helping organizations stay ahead of risk before it reaches the road.
    Read More
Visit Our Blog

Accelerate Your Automotive Cybersecurity Journey Today

Contact Us