Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3029798.3038437acmconferencesArticle/Chapter ViewAbstractPublication PageshriConference Proceedingsconference-collections
abstract

A Study on ROS Vulnerabilities and Countermeasure

Published: 06 March 2017 Publication History

Abstract

ROS (Robot Operating System) is an open source software framework used for robot control. In this paper, we analyzed and tested 4 vulnerabilities related to ROS authentication scheme insufficiency, ROS Bag, communication vulnerability, and service hijacking. Then, We devised countermeasures against them.

References

[1]
Baheti, R. and Gill, H. 2011. Cyber-physical Systems, The impact of control technology.
[2]
ROS, http://www.ros.org
[3]
Quigley, M., Gerkey, B., and Conley, K. 2009. ROS: an open-source Robot Operating System, ICRA workshop on.

Cited By

View all
  • (2024)Achieving the Safety and Security of the End-to-End AV PipelineProceedings of the 2024 on Cyber Security in CarS Workshop10.1145/3689936.3694694(13-24)Online publication date: 20-Nov-2024
  • (2024)Runtime Verification and Field-Based Testing for ROS-Based Robotic SystemsIEEE Transactions on Software Engineering10.1109/TSE.2024.344469750:10(2544-2567)Online publication date: Oct-2024
  • (2024)Mobile Computation in Connected VehiclesVehicle Computing10.1007/978-3-031-59963-7_2(25-63)Online publication date: 11-May-2024
  • Show More Cited By

Index Terms

  1. A Study on ROS Vulnerabilities and Countermeasure

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    HRI '17: Proceedings of the Companion of the 2017 ACM/IEEE International Conference on Human-Robot Interaction
    March 2017
    462 pages
    ISBN:9781450348850
    DOI:10.1145/3029798
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 06 March 2017

    Check for updates

    Author Tags

    1. cyber-physical system
    2. robot
    3. ros
    4. security
    5. vulnerability

    Qualifiers

    • Abstract

    Conference

    HRI '17
    Sponsor:

    Acceptance Rates

    HRI '17 Paper Acceptance Rate 51 of 211 submissions, 24%;
    Overall Acceptance Rate 192 of 519 submissions, 37%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)51
    • Downloads (Last 6 weeks)7
    Reflects downloads up to 30 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Achieving the Safety and Security of the End-to-End AV PipelineProceedings of the 2024 on Cyber Security in CarS Workshop10.1145/3689936.3694694(13-24)Online publication date: 20-Nov-2024
    • (2024)Runtime Verification and Field-Based Testing for ROS-Based Robotic SystemsIEEE Transactions on Software Engineering10.1109/TSE.2024.344469750:10(2544-2567)Online publication date: Oct-2024
    • (2024)Mobile Computation in Connected VehiclesVehicle Computing10.1007/978-3-031-59963-7_2(25-63)Online publication date: 11-May-2024
    • (2023)Has the Social Robot Been Hacked? An Emotion Detection System with Distance-Range Parameters for Feature Selection2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)10.1109/COMPSAC57700.2023.00183(1209-1214)Online publication date: Jun-2023
    • (2023)Robot-Assisted Immersive Kinematic Experience Transfer for Welding TrainingJournal of Computing in Civil Engineering10.1061/JCCEE5.CPENG-513837:2Online publication date: Mar-2023
    • (2022)Research on a PSO-H-SVM-Based Intrusion Detection Method for Industrial Robotic ArmsApplied Sciences10.3390/app1206276512:6(2765)Online publication date: 8-Mar-2022
    • (2022)Autonomous Driving Security: State of the Art and ChallengesIEEE Internet of Things Journal10.1109/JIOT.2021.31300549:10(7572-7595)Online publication date: 15-May-2022
    • (2022)Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendationsInternational Journal of Information Security10.1007/s10207-021-00545-821:1(115-158)Online publication date: 1-Feb-2022
    • (2021)Cybersecurity Test Range for Autonomous Vehicle Shuttles2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW54576.2021.00031(239-248)Online publication date: Sep-2021
    • (2020)Runtime Verification on Hierarchical Properties of ROS-Based Robot SwarmsIEEE Transactions on Reliability10.1109/TR.2019.292368169:2(674-689)Online publication date: Jun-2020
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media