2020
DOI: 10.48550/arxiv.2009.08211
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Can ROS be used securely in industry? Red teaming ROS-Industrial

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…Various security issues affect the ROS data layer graph [70], including TCP's SYN-ACK DoS flooding or FIN-ACK flood attacks. These and many more attacks can easily be implemented using simple constructs that make use of 3.…”
Section: The Ros Data Layer Graphmentioning
confidence: 99%
See 2 more Smart Citations
“…Various security issues affect the ROS data layer graph [70], including TCP's SYN-ACK DoS flooding or FIN-ACK flood attacks. These and many more attacks can easily be implemented using simple constructs that make use of 3.…”
Section: The Ros Data Layer Graphmentioning
confidence: 99%
“…Accordingly, on top of intra-robot network security issues described in the pre-vious sub-section another dimension arises, inter-robot network security. Figure 3.2 presents one such synthetic industrial scenario [70] to study the interactions between different robots and the insecurities arising from them. The scenario presents an assembly line operated by ROS-powered robots while following industrial guidelines on setup and security.…”
Section: The Ros Data Layer Graphmentioning
confidence: 99%
See 1 more Smart Citation
“…The mitigation and patching of vulnerabilities has been an active area of research [19], [20], [21], [22], [23], [24] in computer science and other technological domains. Unfortunately, with robotics being an interdisciplinary field composed from a set of heterogeneous disciplines (including computer science), to the best of our knowledge and literature review, except for a few preliminary tools and reviews [25], [26], [27], [28], [29], [30], not much vulnerability mitigation research related to robotics has been presented so far.…”
Section: Related Workmentioning
confidence: 99%
“…By doing so we obtained a lightweight yet high-fidelity environment whereto perform attacks. Results of the exercise are discussed at [43] and further documented in [44], [28].…”
Section: Red Teaming Ros-industrialmentioning
confidence: 99%

alurity, a toolbox for robot cybersecurity

Mayoral-Vilches,
Abad-Fernández,
Pinzger
et al. 2020
Preprint
Self Cite