Patent attributes
Techniques and methods for securing vehicle systems. For instance, an authorization system may store data representing frequencies at which destination locations are associated pick-up locations for a fleet of autonomous vehicles. The authorization system may then receive a request for an autonomous vehicle to pick up a passenger at a first location and drop off the passenger at a second location. Based on the first location and the second location, the authorization system may determine a frequency for the request. The authorization system may then determine whether a control system for the fleet of autonomous vehicles is compromised based on whether the frequency is less than or equal to a threshold frequency. If the authorization system determines that the control system is compromised, the authorization system may perform a remedial action, such as notifying a teleoperator.