Scenario 1: Attack on an Autonomous Driving Vehicle
In the road traffic of the future, numerous vehicles will be on the road autonomously - as passenger cars or as port of the local public transport. These vehicles are embedded in very complex mobility systems in which they communicate with the traffic infrastructure. This enables them to process sensor and traffic information as well as to learn continuously during their journeys. The networked mobility system places high demands on the functional reliability of hardware and software as well as security against cyber attacks. At the same time, a balance must be maintained between individual freedom and necessary control.
Click on the graphic to see how malicious attackers can be prevented from manipulating an autonomous vehicle to cause damage.
The question of which measures are suitable for effectively preventing misuse of AI systems is also addressed in the white paper Protecting AI systems, preventing misuse by the IT Security, Privacy, Law and Ethics working group.