We propose a robot cybersecurity methodology to secure computational graphs and improve SROS2, usable security tools for ROS 2. We argue that without usability, security in robotics will be greatly impaired.
Learn robot cybersecurity through the Robot Hacking Manual (RHM), an introductory series about cybersecurity in robotics, with an attempt to provide comprehensive case studies and step-by-step tutorials.
We study the underlying default communication middleware of ROS 2, OMG's Data Distribution Service (DDS) and 6 popular implementations. We found all DDS implementations vulnerable to various attacks and demonstrated how ROS 2 systems can be compromised.
The Robot Hacking Manual (RHM) is an introductory series about cybersecurity for robots, with an attempt to provide comprehensive case studies and step-by-step tutorials with the intent to raise awareness in the field and highlight the importance of taking a security-first approach.
What's the status of cybersecurity in robotics? and, how can we best improve cyber-resillience in robotics?
In this article we answer these questions and review the status of the robot cybersecurity after three years of research.
Robot teardown fuels security research by understanding the underlying robot hardware architectures. The results help uncover security vulnerabilities, research quality and safety. We introduce the topic and motivation, while analyzing the robots of Teradyne.
Can ROS be used securely for industrial use cases even though its origins didn't consider it? The present study answers this question experimentally by performing a red team exercise over ROS and ROS-Industrial packages.