2019
DOI: 10.1007/978-3-030-20190-6_8
|View full text |Cite
|
Sign up to set email alerts
|

Penetration Testing ROS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
2
1

Relationship

3
7

Authors

Journals

citations
Cited by 33 publications
(22 citation statements)
references
References 14 publications
0
22
0
Order By: Relevance
“…Particular concerns have emerged with respect to both physical safety and cyber security. It is vital that these issues are thoroughly addressed via a secure-by-design approach (45)(46)(47)(48)(49). Likewise, concerns surfaced regarding the potential privacy compromises emanating from the presence of the robots and the corresponding sensitive data processing.…”
Section: Discussionmentioning
confidence: 99%
“…Particular concerns have emerged with respect to both physical safety and cyber security. It is vital that these issues are thoroughly addressed via a secure-by-design approach (45)(46)(47)(48)(49). Likewise, concerns surfaced regarding the potential privacy compromises emanating from the presence of the robots and the corresponding sensitive data processing.…”
Section: Discussionmentioning
confidence: 99%
“…The Robot Operating System (ROS) is a very popular set of software frameworks used in research and industrial applications [Dieber et al 2020]. Few studies have highlighted its security vulnerabilities.…”
Section: Hazards Due To Internal Vulnerabilitiesmentioning
confidence: 99%
“…Manipulate communication graph (CWE-923): An attacker can modify the communication flow of the middleware by connecting previously unconnected nodes, isolating nodes or introducing new (malicious) nodes. As an example, attacks like those have been presented for the publish/subscribe middleware ROS (Robot Operating System) [ 65 , 66 ]. Manipulating the communication is a tampering attack, which can in the case of node isolation or disconnection also result in a Denial of Service.…”
Section: A Generalized Threat Model For Visual Sensor Networkmentioning
confidence: 99%