{"id":"https://openalex.org/W7135214241","doi":"https://doi.org/10.48550/arxiv.2603.11364","title":"MirrorDrift: Actuated Mirror-Based Attacks on LiDAR SLAM","display_name":"MirrorDrift: Actuated Mirror-Based Attacks on LiDAR SLAM","publication_year":2026,"publication_date":"2026-03-11","ids":{"openalex":"https://openalex.org/W7135214241","doi":"https://doi.org/10.48550/arxiv.2603.11364"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2603.11364","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.11364","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2603.11364","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009357471","display_name":"Rokuto Nagata","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Nagata, Rokuto","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038928126","display_name":"Kenji Koide","orcid":"https://orcid.org/0000-0001-5361-1428"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Koide, Kenji","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110289068","display_name":"Kazuma Ikeda","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ikeda, Kazuma","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116197737","display_name":"Ozora Sako","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sako, Ozora","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5128977984","display_name":"Shion Horie","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Horie, Shion","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5055467060","display_name":"Kentaro Yoshioka","orcid":"https://orcid.org/0000-0001-5640-2250"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yoshioka, Kentaro","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5009357471"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.5884000062942505,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.5884000062942505,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.21969999372959137,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.016300000250339508,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/lidar","display_name":"Lidar","score":0.9147999882698059},{"id":"https://openalex.org/keywords/simultaneous-localization-and-mapping","display_name":"Simultaneous localization and mapping","score":0.47620001435279846},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.46369999647140503},{"id":"https://openalex.org/keywords/reflection","display_name":"Reflection (computer programming)","score":0.4138999879360199},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.39719998836517334},{"id":"https://openalex.org/keywords/signal","display_name":"SIGNAL (programming language)","score":0.3325999975204468}],"concepts":[{"id":"https://openalex.org/C51399673","wikidata":"https://www.wikidata.org/wiki/Q504027","display_name":"Lidar","level":2,"score":0.9147999882698059},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5814999938011169},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5210999846458435},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5206000208854675},{"id":"https://openalex.org/C86369673","wikidata":"https://www.wikidata.org/wiki/Q1203659","display_name":"Simultaneous localization and mapping","level":4,"score":0.47620001435279846},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.46369999647140503},{"id":"https://openalex.org/C65682993","wikidata":"https://www.wikidata.org/wiki/Q1056451","display_name":"Reflection (computer programming)","level":2,"score":0.4138999879360199},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.39719998836517334},{"id":"https://openalex.org/C2779843651","wikidata":"https://www.wikidata.org/wiki/Q7390335","display_name":"SIGNAL (programming language)","level":2,"score":0.3325999975204468},{"id":"https://openalex.org/C62649853","wikidata":"https://www.wikidata.org/wiki/Q199687","display_name":"Remote sensing","level":1,"score":0.32409998774528503},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.323199987411499},{"id":"https://openalex.org/C115051666","wikidata":"https://www.wikidata.org/wiki/Q6522493","display_name":"Ranging","level":2,"score":0.29919999837875366},{"id":"https://openalex.org/C118381688","wikidata":"https://www.wikidata.org/wiki/Q1079524","display_name":"Specular reflection","level":2,"score":0.2964000105857849},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2955000102519989},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.28619998693466187},{"id":"https://openalex.org/C3020199158","wikidata":"https://www.wikidata.org/wiki/Q210521","display_name":"High resolution","level":2,"score":0.2757999897003174}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2603.11364","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.11364","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2603.11364","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.11364","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"score":0.7953094840049744,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"LiDAR":[0,21,26,80,123],"SLAM":[1,22,110],"provides":[2],"high-accuracy":[3],"localization":[4,130],"but":[5],"is":[6,38,144],"fragile":[7],"to":[8,75,112,134],"point-cloud":[9],"corruption":[10],"because":[11],"scan":[12],"matching":[13],"assumes":[14],"geometric":[15],"consistency.":[16],"Prior":[17],"physical":[18],"attacks":[19],"on":[20,25,120],"largely":[23],"rely":[24],"spoofing":[27],"via":[28],"external":[29],"signal":[30],"injection,":[31],"which":[32],"requires":[33],"sensor-specific":[34],"timing":[35,47],"knowledge":[36],"and":[37,49,64,82,92],"increasingly":[39],"mitigated":[40],"by":[41,103],"modern":[42,122],"defense":[43],"mechanisms":[44],"such":[45],"as":[46],"obfuscation":[48],"injection":[50],"rejection.":[51],"In":[52,94,117],"this":[53,143],"work,":[54],"we":[55],"show":[56],"that":[57,69],"specular":[58],"reflection":[59],"offers":[60],"an":[61,66,71],"injection-free":[62],"alternative":[63],"demonstrate":[65],"attack,":[67],"MirrorDrift,":[68],"uses":[70],"actuated":[72],"planar":[73],"mirror":[74,89],"cause":[76],"ghost":[77],"points":[78],"in":[79],"scans":[81],"systematically":[83],"bias":[84],"scan-matching":[85],"correspondences.":[86],"MirrorDrift":[87],"optimizes":[88],"placement,":[90,107],"alignment,":[91],"actuation.":[93],"simulation,":[95],"it":[96,128],"increases":[97],"the":[98,138,145],"average":[99],"pose":[100],"error":[101],"(APE)":[102],"6.1x":[104],"over":[105],"random":[106],"degrading":[108],"three":[109],"systems":[111],"2.29-3.31":[113],"m":[114],"mean":[115],"APE.":[116],"real-world":[118],"experiments":[119],"a":[121],"with":[124],"state-of-the-art":[125],"interference":[126],"mitigation,":[127],"induces":[129],"errors":[131],"of":[132,140],"up":[133],"6.03":[135],"m.":[136],"To":[137],"best":[139],"our":[141],"knowledge,":[142],"first":[146],"successful":[147],"SLAM-targeted":[148],"attack":[149],"against":[150],"production-grade":[151],"secure":[152],"LiDARs.":[153]},"counts_by_year":[],"updated_date":"2026-03-14T06:46:50.379900","created_date":"2026-03-14T00:00:00"}
