Skip to main content

An Emerging Threat: Eve Meets a Robot

(Work-in-Progress)

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6802))

Abstract

In this work, we study the emerging security threats in a quickly proliferating field: robotics. The next generation robots embody most of the networking and computing components we normally use for everyday computing. Thus, the next generation robots virtually inherit all of the security weaknesses we are struggling with today. To make things worse, vulnerabilities in robots are much more significant, as they physically interact with their surroundings which include human beings. In this paper, we first provide a classification of potential physical attacks on robots. In addition, we outline a concrete active attack and propose a countermeasure.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akdemir, K.D., Hammouri, G., Sunar, B.: Non-linear Error Detection for Finite State Machines. In: Youm, H.Y., Yung, M. (eds.) WISA 2009. LNCS, vol. 5932, pp. 226–238. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  2. Aldebaran Robotics, http://www.aldebaran-robotics.com/en/

  3. Anderson, R., Kuhn, M.: Tamper Resistance–a Cautionary Note. In: The Second USENIX Workshop on Electronic Commerce, Oakland, CA, USA, vol. 2, pp. 1–11 (1996)

    Google Scholar 

  4. Anderson, R., Kuhn, M.: Low Cost Attacks on Tamper Resistant Devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 125–136. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  5. Asonov, D., Agrawal, R.: Keyboard acoustic emanations. In: IEEE Symposium on Security and Privacy, pp. 3–11. Citeseer (2004)

    Google Scholar 

  6. Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The sorcerer’s apprentice guide to fault attacks. Proceedings of the IEEE 94, 370–382 (2006)

    Article  Google Scholar 

  7. Bertoni, G., Breveglieri, L., Koren, I., Maistri, P., Piuri, V.: Error analysis and detection procedures for a hardware implementation of the advanced encryption standard. IEEE Transactions on Computers 52(4), 492–505 (2003)

    Article  Google Scholar 

  8. Boneh, D., DeMillo, R., Lipton, R.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37–51. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  9. Chari, S., Rao, J., Rohatgi, P.: Template Attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13–28. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  10. Clavier, C., Coron, J., Dabbous, N.: Differential Power Analysis in the Presence of Hardware Countermeasures. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 252–263. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  11. Computing Community Consortium, A.R.f.U.R.F.I.t.R.: (2009), http://www.us-robotics.us

  12. Cunningham, P., Anderson, R., Mullins, R., Taylor, G., Moore, S.: Improving Smart Card Security Using Self-Timed Circuits. In: Proceedings of the 8th International Symposium on Asynchronus Circuits and Systems. IEEE Computer Society, Washington, DC, USA (2002)

    Google Scholar 

  13. Denning, T., Matuszek, C., Koscher, K., Smith, J., Kohno, T.: A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons. In: Proceedings of the 11th International Conference on Ubiquitous Computing (Ubicomp 2009), Orlando, FL, USA, pp. 105–114 (2009)

    Google Scholar 

  14. Fu, K.: Inside risks, reducing the risks of implantable medical devices: A prescription to improve security and privacy of pervasive health care. Communications of the ACM 52, 25–27 (2009)

    Article  Google Scholar 

  15. Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic Analysis: Concrete Results. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 251–261. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  16. Gaubatz, G., Sunar, B.: Robust finite field arithmetic for fault-tolerant public-key cryptography. In: Breveglieri, L., Koren, I. (eds.) FDTC 2006. LNCS, vol. 4236, pp. 196–210. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  17. Gaubatz, G., Sunar, B., Savas, E.: Sequential circuit design for embedded cryptographic applications resilient to adversarial faults. IEEE Transactions on Computers 57(1), 126–138 (2008)

    Article  MathSciNet  Google Scholar 

  18. Gürkaynak, F., Oetiker, S., Kaeslin, H., Felber, N., Fichtner, W.: Improving DPA Security by Using Globally-Asynchronous Locally-Synchronous Systems. European Solid-State Circuits Conference (ESSCIRC 2005), Grenoble, France, pp. 407–410 (2005)

    Google Scholar 

  19. Higgins, F., Tomlinson, A., Martin, K.: Survey on Security Challenges for Swarm Robotics. In: Fifth International Conference on Autonomic and Autonomous Systems, ICAS 2009, pp. 307–312. IEEE, Los Alamitos (2009)

    Chapter  Google Scholar 

  20. General purpose type distance measuring sensors. SparkFun Database (December 2009), http://www.sparkfun.com/datasheets/Components/GP2Y0A21YK.pdf , http://www.sparkfun.com/datasheets/Components/GP2Y0A21YK.pdf

  21. Pir sensor. Parallax Database (December 2009), http://www.parallax.com/dl/docs/prod/audiovis/pirsensor-v1.2.pdf , http://www.parallax.com/dl/docs/prod/audiovis/pirsensor-v1.2.pdf

  22. Infrared flame sensor for vex. Techno-stuff Database (December 2009), http://www.techno-stuff.com/VIRFL.htm , http://www.techno-stuff.com/VIRFL.htm

  23. Ju, A.: Researchers raise uncomfortable questions by showing how GPS navigation devices can be duped. Cornell University Chronicle (2008), http://www.news.cornell.edu/stories/Sept08/GPSSpoofing.aj.html

  24. Karpovsky, M., Kulikowski, K., Taubin, A.: Robust protection against fault-injection attacks on smart cards implementing the advanced encryption standard. In: DSN 2004: Proceedings of the 2004 International Conference on Dependable Systems and Networks, p. 93. IEEE Computer Society, Washington, DC, USA (2004)

    Google Scholar 

  25. Karpovsky, M., Kulikowski, K.J., Taubin, A.: Differential fault analysis attack resistant architectures for the advanced encryption standard. In: Proc. World Computing Congress (2004)

    Google Scholar 

  26. Karpovsky, M., Taubin, A.: A new class of nonlinear systematic error detecting codes. IEEE Trans. Info Theory 50(8), 1818–1820 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  27. Karri, R., Wu, K., Mishra, P., Kim, Y.: Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 21(12), 1509–1517 (2002)

    Article  Google Scholar 

  28. Kocher, P.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)

    Google Scholar 

  29. Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  30. Kuhn, M.: Optical time-domain eavesdropping risks of CRT displays. In: IEEE Symposium on Security and Privacy, pp. 3–18. Citeseer (2002)

    Google Scholar 

  31. Kuhn, M.: Electromagnetic eavesdropping risks of flat-panel displays. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 88–107. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  32. Kuhn, M.: Security limits for compromising emanations. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 265–279. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  33. Kulikowski, K., Venkataraman, V., Wang, Z., Taubin, A., Karpovsky, M.: Asynchronous balanced gates tolerant to interconnect variability. In: IEEE International Symposium on Circuits and Systems, ISCAS 2008, pp. 3190–3193 (2008)

    Google Scholar 

  34. Kulikowski, K., Wang, Z., Karpovsky, M.: Comparative Analysis of Robust Fault Attack Resistant Architectures for Public and Private Cryptosystems. In: Proceedings of the 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 41–50. IEEE Computer Society, Washington, DC, USA (2008)

    Chapter  Google Scholar 

  35. Kulikowski, K., Karpovsky, M., Taubin, A.: Robust codes for fault attack resistant cryptographic hardware. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (FTDC 2005) (2005)

    Google Scholar 

  36. Kulikowski, K.J., Karpovsky, M.G., Taubin, A.: Fault attack resistant cryptographic hardware with uniform error detection. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, vol. 4236, pp. 185–195. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  37. Lee, J., Jung, S., Lim, J.: Detecting Trapdoors in Smart Cards Using Timing and Power Analysis. In: Khendek, F., Dssouli, R. (eds.) TestCom 2005. LNCS, vol. 3502, pp. 275–288. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  38. Line follower kit. VEX Robotics Database (December 2009), http://www.vexrobotics.com/docs/inventors-guide/line-follower-5-1-06.pdf , http://www.vexrobotics.com/docs/inventors-guide/line-follower-5-1-06.pdf

  39. Maistri, P., Leveugle, R.: Double-Data-Rate Computation as a Countermeasure against Fault Analysis. IEEE Transactions on Computers 57(11), 1528–1539 (2008)

    Article  MathSciNet  Google Scholar 

  40. Maistri, P., Vanhauwaert, P., Leveugle, R.: Evaluation of Register-Level Protection Techniques for the Advanced Encryption Standard by Multi-Level Fault Injections. In: 22nd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems, DFT 2007, pp. 499–507 (2007)

    Google Scholar 

  41. Matthews, A.: Low cost attacks on smart cards: The electromagnetic side-channel. Next Generation Security Software (September 2006)

    Google Scholar 

  42. Messerges, T.: Securing the AES Finalists Against Power Analysis Attacks. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 150–164. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  43. Mitra, S., McCluskey, E.: Which concurrent error detection scheme to choose? In: Proc. Int. Test Conference (ITC), pp. 985–994. IEEE, IEEE Press, Los Alamitos (2000)

    Google Scholar 

  44. Naccache, D.: Finding faults. IEEE Security and Privacy 3(5), 61–65 (2005)

    Article  Google Scholar 

  45. Noubir, G.: SWARM: Secure Wireless Ad hoc Robots on Mission A course where wireless security meets robotics. In: Proceedings of the 10th Colloquium for Information Systems Security Education (CISSE 2006), Adelphi, MD, USA, pp. 82–89 (2006)

    Google Scholar 

  46. Oswald, E., Mangard, S., Pramstaller, N.: Secure and Efficient Masking of AES-A Mission Impossible. Tech. rep., Technical Report IAIK-TR 2003/11/1 (2004), http://www.eprint.iacr.org/

  47. Pramstaller, N., Gurkaynak, F., Haene, S., Kaeslin, H., Felber, N., Fichtner, W.: Towards an AES Crypto-chip Resistant to Differential Power Analysis. In: European Solid-State Circuits Conference (ESSCIRC 2004), Leuven, Belgium, pp. 307–310 (2004)

    Google Scholar 

  48. Quisquater, J.J., Samyde, D.: Eddy current for magnetic analysis with active sensor. In: Proceedings of Esmart, pp. 185–194 (2002)

    Google Scholar 

  49. Quisquater, J., Samyde, D.: ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol. 2140, pp. 200–210. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  50. Regazzoni, F., Badel, S., Eisenbarth, T., Grobschadl, J., Poschmann, A., Toprak, Z., Macchetti, M., Pozzi, L., Paar, C., Leblebici, Y., et al.: A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies. In: International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation (IC-SAMOS 2007), Samos, Greece, pp. 209–214 (2007)

    Google Scholar 

  51. Sankai, Y.: Leading edge of cybernics: Robot suit hal. In: SICE-ICASE International Joint Conference (2006)

    Google Scholar 

  52. Schmidt, J., Hutter, M.: Optical and em fault-attacks on crt-based rsa: Concrete results. In: Austrochip 2007: Proceedings of the 15th Austrian Workshop on Microelectronics (2007)

    Google Scholar 

  53. Schmidt, J., Hutter, M.: Optical and em fault-attacks on crt-based rsa: Concrete results. In: Proceedings of the Austrochip, pp. 61–67. Citeseer (2007)

    Google Scholar 

  54. Shamir, A., Tromer, E.: Acoustic cryptanalysis: on nosy people and noisy machines, http://www.people.csail.mit.edu/tromer/acoustic

  55. Skorobogatov, S., Anderson, R.: Optical Fault Induction Attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 2–12. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  56. Tiri, K., Akmal, M., Verbauwhede, I.: A Dynamic and Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smart Cards. In: European Solid-State Circuits Conference (ESSCIRC 2002), Florence, Italy, pp. 403–406 (2002)

    Google Scholar 

  57. Toprak, Z., Leblebici, Y.: Low-Power Current Mode Logic for Improved DPA-Resistance in Embedded Systems. In: International Symposium on Circuits and Systems (ISCAS 2005), Kobe, Japan, vol. 2, pp. 1059–1062 (2005)

    Google Scholar 

  58. Inventor’s guide. VEX Robotics Database (December 2009), http://www.vexrobotics.com/docs/inventors-guide/main-2008/vex-inventors-guide-07022008.pdf , http://www.vexrobotics.com/docs/inventors-guide/main-2008/vex-inventors-guide-07022008.pdf

  59. Ultrasonic sensor kit. VEX Robotics Database (December 2009), http://www.vexrobotics.com/docs/inventors-guide/vex-robotics-ultra-sonic-5-2-06.pdf , http://www.vexrobotics.com/docs/inventors-guide/vex-robotics-ultra-sonic-5-2-06.pdf

  60. Executive Summary World Robotics 2008 (2008), http://www.worldrobotics.org/downloads/2008_executive_summary.pdf

  61. Yen, S., Joye, M.: Checking Before Output Not Be Enough Against Fault-Based Cryptanalysis. IEEE Transactions on Computers 49(9), 967–970 (2000)

    Article  MATH  Google Scholar 

  62. Zhuang, L., Zhou, F., Tygar, J.: Keyboard acoustic emanations revisited. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, pp. 373–382. ACM, New York (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Akdemir, K.D., Karakoyunlu, D., Padir, T., Sunar, B. (2011). An Emerging Threat: Eve Meets a Robot. In: Chen, L., Yung, M. (eds) Trusted Systems. INTRUST 2010. Lecture Notes in Computer Science, vol 6802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25283-9_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25283-9_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25282-2

  • Online ISBN: 978-3-642-25283-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics