Abstract
In this work, we study the emerging security threats in a quickly proliferating field: robotics. The next generation robots embody most of the networking and computing components we normally use for everyday computing. Thus, the next generation robots virtually inherit all of the security weaknesses we are struggling with today. To make things worse, vulnerabilities in robots are much more significant, as they physically interact with their surroundings which include human beings. In this paper, we first provide a classification of potential physical attacks on robots. In addition, we outline a concrete active attack and propose a countermeasure.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Akdemir, K.D., Hammouri, G., Sunar, B.: Non-linear Error Detection for Finite State Machines. In: Youm, H.Y., Yung, M. (eds.) WISA 2009. LNCS, vol. 5932, pp. 226–238. Springer, Heidelberg (2009)
Aldebaran Robotics, http://www.aldebaran-robotics.com/en/
Anderson, R., Kuhn, M.: Tamper Resistance–a Cautionary Note. In: The Second USENIX Workshop on Electronic Commerce, Oakland, CA, USA, vol. 2, pp. 1–11 (1996)
Anderson, R., Kuhn, M.: Low Cost Attacks on Tamper Resistant Devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 125–136. Springer, Heidelberg (1998)
Asonov, D., Agrawal, R.: Keyboard acoustic emanations. In: IEEE Symposium on Security and Privacy, pp. 3–11. Citeseer (2004)
Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The sorcerer’s apprentice guide to fault attacks. Proceedings of the IEEE 94, 370–382 (2006)
Bertoni, G., Breveglieri, L., Koren, I., Maistri, P., Piuri, V.: Error analysis and detection procedures for a hardware implementation of the advanced encryption standard. IEEE Transactions on Computers 52(4), 492–505 (2003)
Boneh, D., DeMillo, R., Lipton, R.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37–51. Springer, Heidelberg (1997)
Chari, S., Rao, J., Rohatgi, P.: Template Attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13–28. Springer, Heidelberg (2003)
Clavier, C., Coron, J., Dabbous, N.: Differential Power Analysis in the Presence of Hardware Countermeasures. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 252–263. Springer, Heidelberg (2000)
Computing Community Consortium, A.R.f.U.R.F.I.t.R.: (2009), http://www.us-robotics.us
Cunningham, P., Anderson, R., Mullins, R., Taylor, G., Moore, S.: Improving Smart Card Security Using Self-Timed Circuits. In: Proceedings of the 8th International Symposium on Asynchronus Circuits and Systems. IEEE Computer Society, Washington, DC, USA (2002)
Denning, T., Matuszek, C., Koscher, K., Smith, J., Kohno, T.: A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons. In: Proceedings of the 11th International Conference on Ubiquitous Computing (Ubicomp 2009), Orlando, FL, USA, pp. 105–114 (2009)
Fu, K.: Inside risks, reducing the risks of implantable medical devices: A prescription to improve security and privacy of pervasive health care. Communications of the ACM 52, 25–27 (2009)
Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic Analysis: Concrete Results. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 251–261. Springer, Heidelberg (2001)
Gaubatz, G., Sunar, B.: Robust finite field arithmetic for fault-tolerant public-key cryptography. In: Breveglieri, L., Koren, I. (eds.) FDTC 2006. LNCS, vol. 4236, pp. 196–210. Springer, Heidelberg (2006)
Gaubatz, G., Sunar, B., Savas, E.: Sequential circuit design for embedded cryptographic applications resilient to adversarial faults. IEEE Transactions on Computers 57(1), 126–138 (2008)
Gürkaynak, F., Oetiker, S., Kaeslin, H., Felber, N., Fichtner, W.: Improving DPA Security by Using Globally-Asynchronous Locally-Synchronous Systems. European Solid-State Circuits Conference (ESSCIRC 2005), Grenoble, France, pp. 407–410 (2005)
Higgins, F., Tomlinson, A., Martin, K.: Survey on Security Challenges for Swarm Robotics. In: Fifth International Conference on Autonomic and Autonomous Systems, ICAS 2009, pp. 307–312. IEEE, Los Alamitos (2009)
General purpose type distance measuring sensors. SparkFun Database (December 2009), http://www.sparkfun.com/datasheets/Components/GP2Y0A21YK.pdf , http://www.sparkfun.com/datasheets/Components/GP2Y0A21YK.pdf
Pir sensor. Parallax Database (December 2009), http://www.parallax.com/dl/docs/prod/audiovis/pirsensor-v1.2.pdf , http://www.parallax.com/dl/docs/prod/audiovis/pirsensor-v1.2.pdf
Infrared flame sensor for vex. Techno-stuff Database (December 2009), http://www.techno-stuff.com/VIRFL.htm , http://www.techno-stuff.com/VIRFL.htm
Ju, A.: Researchers raise uncomfortable questions by showing how GPS navigation devices can be duped. Cornell University Chronicle (2008), http://www.news.cornell.edu/stories/Sept08/GPSSpoofing.aj.html
Karpovsky, M., Kulikowski, K., Taubin, A.: Robust protection against fault-injection attacks on smart cards implementing the advanced encryption standard. In: DSN 2004: Proceedings of the 2004 International Conference on Dependable Systems and Networks, p. 93. IEEE Computer Society, Washington, DC, USA (2004)
Karpovsky, M., Kulikowski, K.J., Taubin, A.: Differential fault analysis attack resistant architectures for the advanced encryption standard. In: Proc. World Computing Congress (2004)
Karpovsky, M., Taubin, A.: A new class of nonlinear systematic error detecting codes. IEEE Trans. Info Theory 50(8), 1818–1820 (2004)
Karri, R., Wu, K., Mishra, P., Kim, Y.: Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 21(12), 1509–1517 (2002)
Kocher, P.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)
Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)
Kuhn, M.: Optical time-domain eavesdropping risks of CRT displays. In: IEEE Symposium on Security and Privacy, pp. 3–18. Citeseer (2002)
Kuhn, M.: Electromagnetic eavesdropping risks of flat-panel displays. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 88–107. Springer, Heidelberg (2005)
Kuhn, M.: Security limits for compromising emanations. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 265–279. Springer, Heidelberg (2005)
Kulikowski, K., Venkataraman, V., Wang, Z., Taubin, A., Karpovsky, M.: Asynchronous balanced gates tolerant to interconnect variability. In: IEEE International Symposium on Circuits and Systems, ISCAS 2008, pp. 3190–3193 (2008)
Kulikowski, K., Wang, Z., Karpovsky, M.: Comparative Analysis of Robust Fault Attack Resistant Architectures for Public and Private Cryptosystems. In: Proceedings of the 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 41–50. IEEE Computer Society, Washington, DC, USA (2008)
Kulikowski, K., Karpovsky, M., Taubin, A.: Robust codes for fault attack resistant cryptographic hardware. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (FTDC 2005) (2005)
Kulikowski, K.J., Karpovsky, M.G., Taubin, A.: Fault attack resistant cryptographic hardware with uniform error detection. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, vol. 4236, pp. 185–195. Springer, Heidelberg (2006)
Lee, J., Jung, S., Lim, J.: Detecting Trapdoors in Smart Cards Using Timing and Power Analysis. In: Khendek, F., Dssouli, R. (eds.) TestCom 2005. LNCS, vol. 3502, pp. 275–288. Springer, Heidelberg (2005)
Line follower kit. VEX Robotics Database (December 2009), http://www.vexrobotics.com/docs/inventors-guide/line-follower-5-1-06.pdf , http://www.vexrobotics.com/docs/inventors-guide/line-follower-5-1-06.pdf
Maistri, P., Leveugle, R.: Double-Data-Rate Computation as a Countermeasure against Fault Analysis. IEEE Transactions on Computers 57(11), 1528–1539 (2008)
Maistri, P., Vanhauwaert, P., Leveugle, R.: Evaluation of Register-Level Protection Techniques for the Advanced Encryption Standard by Multi-Level Fault Injections. In: 22nd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems, DFT 2007, pp. 499–507 (2007)
Matthews, A.: Low cost attacks on smart cards: The electromagnetic side-channel. Next Generation Security Software (September 2006)
Messerges, T.: Securing the AES Finalists Against Power Analysis Attacks. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 150–164. Springer, Heidelberg (2001)
Mitra, S., McCluskey, E.: Which concurrent error detection scheme to choose? In: Proc. Int. Test Conference (ITC), pp. 985–994. IEEE, IEEE Press, Los Alamitos (2000)
Naccache, D.: Finding faults. IEEE Security and Privacy 3(5), 61–65 (2005)
Noubir, G.: SWARM: Secure Wireless Ad hoc Robots on Mission A course where wireless security meets robotics. In: Proceedings of the 10th Colloquium for Information Systems Security Education (CISSE 2006), Adelphi, MD, USA, pp. 82–89 (2006)
Oswald, E., Mangard, S., Pramstaller, N.: Secure and Efficient Masking of AES-A Mission Impossible. Tech. rep., Technical Report IAIK-TR 2003/11/1 (2004), http://www.eprint.iacr.org/
Pramstaller, N., Gurkaynak, F., Haene, S., Kaeslin, H., Felber, N., Fichtner, W.: Towards an AES Crypto-chip Resistant to Differential Power Analysis. In: European Solid-State Circuits Conference (ESSCIRC 2004), Leuven, Belgium, pp. 307–310 (2004)
Quisquater, J.J., Samyde, D.: Eddy current for magnetic analysis with active sensor. In: Proceedings of Esmart, pp. 185–194 (2002)
Quisquater, J., Samyde, D.: ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol. 2140, pp. 200–210. Springer, Heidelberg (2001)
Regazzoni, F., Badel, S., Eisenbarth, T., Grobschadl, J., Poschmann, A., Toprak, Z., Macchetti, M., Pozzi, L., Paar, C., Leblebici, Y., et al.: A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies. In: International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation (IC-SAMOS 2007), Samos, Greece, pp. 209–214 (2007)
Sankai, Y.: Leading edge of cybernics: Robot suit hal. In: SICE-ICASE International Joint Conference (2006)
Schmidt, J., Hutter, M.: Optical and em fault-attacks on crt-based rsa: Concrete results. In: Austrochip 2007: Proceedings of the 15th Austrian Workshop on Microelectronics (2007)
Schmidt, J., Hutter, M.: Optical and em fault-attacks on crt-based rsa: Concrete results. In: Proceedings of the Austrochip, pp. 61–67. Citeseer (2007)
Shamir, A., Tromer, E.: Acoustic cryptanalysis: on nosy people and noisy machines, http://www.people.csail.mit.edu/tromer/acoustic
Skorobogatov, S., Anderson, R.: Optical Fault Induction Attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 2–12. Springer, Heidelberg (2003)
Tiri, K., Akmal, M., Verbauwhede, I.: A Dynamic and Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smart Cards. In: European Solid-State Circuits Conference (ESSCIRC 2002), Florence, Italy, pp. 403–406 (2002)
Toprak, Z., Leblebici, Y.: Low-Power Current Mode Logic for Improved DPA-Resistance in Embedded Systems. In: International Symposium on Circuits and Systems (ISCAS 2005), Kobe, Japan, vol. 2, pp. 1059–1062 (2005)
Inventor’s guide. VEX Robotics Database (December 2009), http://www.vexrobotics.com/docs/inventors-guide/main-2008/vex-inventors-guide-07022008.pdf , http://www.vexrobotics.com/docs/inventors-guide/main-2008/vex-inventors-guide-07022008.pdf
Ultrasonic sensor kit. VEX Robotics Database (December 2009), http://www.vexrobotics.com/docs/inventors-guide/vex-robotics-ultra-sonic-5-2-06.pdf , http://www.vexrobotics.com/docs/inventors-guide/vex-robotics-ultra-sonic-5-2-06.pdf
Executive Summary World Robotics 2008 (2008), http://www.worldrobotics.org/downloads/2008_executive_summary.pdf
Yen, S., Joye, M.: Checking Before Output Not Be Enough Against Fault-Based Cryptanalysis. IEEE Transactions on Computers 49(9), 967–970 (2000)
Zhuang, L., Zhou, F., Tygar, J.: Keyboard acoustic emanations revisited. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, pp. 373–382. ACM, New York (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Akdemir, K.D., Karakoyunlu, D., Padir, T., Sunar, B. (2011). An Emerging Threat: Eve Meets a Robot. In: Chen, L., Yung, M. (eds) Trusted Systems. INTRUST 2010. Lecture Notes in Computer Science, vol 6802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25283-9_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-25283-9_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25282-2
Online ISBN: 978-3-642-25283-9
eBook Packages: Computer ScienceComputer Science (R0)