2015
DOI: 10.1007/978-3-319-27146-0_12
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Attacks on Mobile Robots: I2C Clock Attacking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
4
0
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 6 publications
0
4
0
1
Order By: Relevance
“…Several communication protocols represent a potential attack surface. For instance, USB [9], I2C [10], JTAG [11], UART [12], CAN [13] and SPI [14] can be physically accessed from any available pins of the devices without any modification.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Several communication protocols represent a potential attack surface. For instance, USB [9], I2C [10], JTAG [11], UART [12], CAN [13] and SPI [14] can be physically accessed from any available pins of the devices without any modification.…”
Section: Related Workmentioning
confidence: 99%
“…However, it is also simple to disrupt communications within this bus. As presented in [10], the I2C bus attacked using a clock glitching approach. During the attack, the I2C clock line (SCL) is forced to low while communication between a master and a slave peripheral occurs.…”
Section: Related Workmentioning
confidence: 99%
“…The main attack performed on this bus targets the clock signal which has a critical role in a synchronous protocol such as I2C. These clock glitching attacks [12] affect the system and result in a global malfunction or a denial of service. I2C can also be targeted by attacks that aim to recover the data and firmware stored in an EEPROM [13] [14].…”
Section: Attacks On Communication Busmentioning
confidence: 99%
“…Due to their increasing adoption, robotic systems are becoming an attractive target of malicious attacks [1]. From interruption of services, to falsification and theft of data, increasingly sophisticated methods are being deployed to attack various components of a robotic system [2,3,4]. Hence, security for robotic systems has become an ever-evolving challenge encompassing physical as well as communication and software layers of the architecture.…”
Section: Introductionmentioning
confidence: 99%