Worst Case: No Protective Measures available

  • Manipulation: Via the technical interface with which autonomous vehicles communicate with each other and with their environment (Car-2X interface), attackers are able to manipulate the vehicle's sensors and internal data transmission systems. It would also be technically conceivable for the attackers to intervene directly in the vehicle's control electronics.
  • Consequences: The autonomous vehicle is in the hands of the attackers and can be controlled by them - for example, to steer it specifically into a crowd of people.