Results from spoofing response characterization tests are presented for a set of four GPS receivers. This work is intended to provide information to the GNSS community to answer the following questions:

1. How aggressively can receiver dynamics be manipulated by a spoofing attack?
a. How quickly could a timing or position bias be introduced?
b. What kinds of oscillations could a spoofer cause in a receiver´s position and timing?
c. How different are receiver responses to spoofing?

2. Would a J/N-type jamming detector trigger on a spoofing attack?

Cite and download the paper:
Shepard, D.P. and T.E. Humphreys, "Characterization of Receiver Response to Spoofing Attacks," Proceedings of ION GNSS, Portland, Oregon, 2011.

Download the presentation here [pptx].