Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2011
DOI: 10.1007/978-3-642-25283-9_18
|View full text |Cite
|
Sign up to set email alerts
|

An Emerging Threat: Eve Meets a Robot

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(10 citation statements)
references
References 40 publications
0
10
0
Order By: Relevance
“…Typically, these safety Threat Tools Defence Mechanisms Attacks on Sensor Data Side-Channel attacks (active&passive) Anti-Virus [24,15,6,25,16,26,13,16] Intrusion Detection System Hardware Attacks [13,17] Redundancy, Diversity Man In the Middle [27] Electro-Magnetic Shielding Encryption Authentication Attacks on Hardware Physical Manipulation [20] Device Signatures Hardware Trojan [28,19] Authentication Hardware Testing Formal Verification Attacks on Software Malware [9,22,23] Anti-Virus Denial of Service [23,24] Hardening (IDS,Firewall, etc.) Phishing [22] No external hardware interfaces Vigilance Software Testing Security Updates Authentication & Access-Control Attacks on Infrastructure Standard Password [9] Anti-Virus Man In The Middle [6,9] Authentication & Access Control Encryption Table 2: Examples of tools and defence mechanisms for our Threat Vectors mechanisms do not take into account active attackers [5] and manufacturers are negligent or might not be aware of the fact that side-channel attacks [23] also apply to robots. These attacks have the potential to leak sensitive information and can even cause environmental harm.…”
Section: Threat Vector #1: Attacks On Sensor Datamentioning
confidence: 99%
See 4 more Smart Citations
“…Typically, these safety Threat Tools Defence Mechanisms Attacks on Sensor Data Side-Channel attacks (active&passive) Anti-Virus [24,15,6,25,16,26,13,16] Intrusion Detection System Hardware Attacks [13,17] Redundancy, Diversity Man In the Middle [27] Electro-Magnetic Shielding Encryption Authentication Attacks on Hardware Physical Manipulation [20] Device Signatures Hardware Trojan [28,19] Authentication Hardware Testing Formal Verification Attacks on Software Malware [9,22,23] Anti-Virus Denial of Service [23,24] Hardening (IDS,Firewall, etc.) Phishing [22] No external hardware interfaces Vigilance Software Testing Security Updates Authentication & Access-Control Attacks on Infrastructure Standard Password [9] Anti-Virus Man In The Middle [6,9] Authentication & Access Control Encryption Table 2: Examples of tools and defence mechanisms for our Threat Vectors mechanisms do not take into account active attackers [5] and manufacturers are negligent or might not be aware of the fact that side-channel attacks [23] also apply to robots. These attacks have the potential to leak sensitive information and can even cause environmental harm.…”
Section: Threat Vector #1: Attacks On Sensor Datamentioning
confidence: 99%
“…Attacking the sensors of this autonomous MSR could lead to privacy issues or to accidents like in [11] where a safety failure resulted in an accident which included a child. We picked four of the most interesting active-side channel sensor attacks and refer to the literature for passive side-channel attacks and more examples [5,22,23,29,30]. …”
Section: Threat Vector #1: Attacks On Sensor Datamentioning
confidence: 99%
See 3 more Smart Citations