Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3548606.3560681acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

On the (In)Security of Secure ROS2

Published: 07 November 2022 Publication History

Abstract

Robot Operating System (ROS) has been the mainstream platform for research and development of robotic applications. This platform is well-known for lacking security features and efficiency for distributed robotic computations. To address these issues, ROS2 is recently developed by utilizing the Data Distribution Service (DDS) to provide security support. Integrated with DDS, ROS2 is expected to establish the basis for trustworthy robotic ecosystems.
In this paper, we systematically study the security of the current ROS2 implementation from three perspectives. By abstracting the key functions from the ROS2 native implementation, we first formally describe the ROS2 system communication workflow and model it using a concurrent modeling language. Second, we verify the model with some key security properties through a model checker, and successfully identify four security vulnerabilities in ROS2's native security module: Secure ROS2 (SROS2). To validate these flaws, we set up simulation and physical multi-robot testbeds running different real-world workloads developed by Open Robotics and Amazon AWS Robotics. We demonstrate that an adversary can exploit these vulnerabilities to totally invalidate the security protection offered by SROS2, and obtain unauthorized permissions or steal critical information. Third, to enhance the security of ROS2, we propose a general defense solution based on the private broadcast encryption scheme. We run different workloads and benchmarks to show the efficiency and security of our defense. Our findings have been acknowledge by ROS2 official, and the suggested mitigation has been implemented in the latest SROS2 version.

References

[1]
2009. Supporting Navigation in Multi-Robot Systems through Delay Tolerant Network Communication. IFAC Proceedings Volumes 42, 22 (2009), 25--30. 1st IFAC Workshop on Networked Robotics.
[2]
2019. CVE-2019--19625 Detail. https://nvd.nist.gov/vuln/detail/CVE-2019--19625.
[3]
2020. ROS2 Node to Participant Mapping. https://design.ros2.org/articles/Node_ to_Participant_mapping.html
[4]
2021. ApexAI ROS2 Performance Test [Online]. https://gitlab.com/ApexAI/ performance_test.
[5]
2021. ROS 2 robotic systems threat model. https://design.ros2.org/articles/ros2_ threat_model.html.
[6]
2022. Apex AI: The Vehicle OS Company. https://www.apex.ai/.
[7]
2022. Cloud Robotics Core: Kubernetes, Federation, App Management [Online]. https://googlecloudrobotics.github.io/core/.
[8]
2022. IRobot: Robot Vacuum and Mop. https://www.irobot.com/
[9]
2022. On the (In)Security of Secure ROS2. https://sites.google.com/view/securesros2.
[10]
2022. ROS Metrics. https://metrics.ros.org/rosdistro_rosdistro.html
[11]
Shashank Agrawal and Melissa Chase. 2017. FAME: Fast Attribute-Based Message Encryption. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (Dallas, Texas, USA) (CCS '17). Association for Computing Machinery, New York, NY, USA, 665--682.
[12]
Aliasrobotics. 2020. Robot Vulnerability Database (RVD) [Online]. https://github. com/aliasrobotics/RVD/.
[13]
Krzysztof R. Apt and Dexter Kozen. 1986. Limits for automatic verification of finite-state concurrent systems. Inf. Process. Lett. 22, 6 (1986), 307--309.
[14]
AWS-Robotics. 2021. Aws-Robotics/AWS RoboMaker Small Warehouse World. https://github.com/aws-robotics/aws-robomaker-small-warehouse-world
[15]
Agata Barci, Micha Barci, and Christian Bettstetter. 2019. Robots that Sync and Swarm: A Proof of Concept in ROS 2. In 2019 International Symposium on Multi-Robot and Multi-Agent Systems (MRS). 98--104.
[16]
Adam Barth, Dan Boneh, and Brent Waters. 2006. Privacy in Encrypted Content Distribution Using Private Broadcast Encryption. In Financial Cryptography and Data Security, Giovanni Di Crescenzo and Avi Rubin (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 52--64.
[17]
Elena Basan, Mikhail Medvedev, and Stanislav Teterevyatnikov. 2018. Analysis of the Impact of Denial of Service Attacks on the Group of Robots. In 2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). 63--638.
[18]
John Bethencourt, Amit Sahai, and Brent Waters. 2007. Ciphertext-Policy Attribute-Based Encryption. In 2007 IEEE Symposium on Security and Privacy (SP '07). 321--334.
[19]
B. Blanchet. 2001. An efficient cryptographic protocol verifier based on prolog rules. In Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001. 82--96.
[20]
Renato Carvalho, Alcino Cunha, Nuno Macedo, and André Santos. 2020. Verification of system-wide safety properties of ROS applications. In 2020 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS). 7249--7254.
[21]
Wouter Castryck, Jana Sotáková, and Frederik Vercauteren. 2020. Breaking the decisional Diffie-Hellman problem for class group actions using genus theory. In Annual International Cryptology Conference. Springer, 92--120.
[22]
Jie Chen, Romain Gay, and Hoeteck Wee. 2015. Improved Dual System ABE in Prime-Order Groups via Predicate Encodings. In Advances in Cryptology - EUROCRYPT 2015, Elisabeth Oswald and Marc Fischlin (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 595--624.
[23]
Peter Chen, Marjon Dean, Don Ojoko-Adams, Hassan Osman, Lilian Lopez, Nick Xie, and Nancy Mead. 2004. System Quality Requirements Engineering (SQUARE) Methodology: Case Study on Asset Management System. (12 2004), 326.
[24]
Qi Alfred Chen, Yucheng Yin, Yiheng Feng, Z Morley Mao, and Henry X Liu. 2018. Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control. In 25th Annual Network and Distributed System Security Symposium (NDSS).
[25]
Kun Cheng, Yuan Zhou, Bihuan Chen, Rui Wang, Yuebin Bai, and Yang Liu. 2020. Guardauto: A decentralized runtime protection system for autonomous driving. IEEE Trans. Comput. 70, 10 (2020), 1569--1581.
[26]
Key-whan Chung, Xiao Li, Peicheng Tang, Zeran Zhu, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, and Thenkurussi Kesavadas. 2019. Smart Malware that Uses Leaked Control Data of Robotic Applications: The Case of Raven-II Surgical Robots. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2019, Chaoyang District, Beijing, China, September 23--25, 2019.
[27]
Edmund M. Clarke, William Klieber, Milo Nováek, and Paolo Zuliani. 2012. Model Checking and the State Explosion Problem. Springer Berlin Heidelberg, 1--30.
[28]
Edmund M Clarke Jr, Orna Grumberg, Daniel Kroening, Doron Peled, and Helmut Veith. 2018. Model checking.
[29]
Ken Conley. 2011. ROS command line tool: rostopic. http://library.isr.ist.utl.pt/ docs/roswiki/rostopic.html.
[30]
DDS Foundation. 2020. Data Distribution Services. https://www.dds-foundation. org/.
[31]
Gelei Deng, Yuan Zhou, Yuan Xu, Tianwei Zhang, and Yang Liu. 2021. An Investigation of Byzantine Threats in Multi-Robot Systems. In 24th International Symposium on Research in Attacks, Intrusions and Defenses. 17--32.
[32]
Zuohua Ding, Yuan Zhou, Mingyue Jiang, and MengChu Zhou. 2014. A new class of Petri nets for modeling and property verification of switched stochastic systems. IEEE Transactions on Systems, Man, and Cybernetics: Systems 45, 7 (2014), 1087--1100.
[33]
Zuohua Ding, Yuan Zhou, and MengChu Zhou. 2014. Stability analysis of switched fuzzy systems via model checking. IEEE Transactions on Fuzzy Systems 22, 6 (2014), 1503--1514.
[34]
Murph Finnicum and Samuel T King. 2011. Building Secure Robot Applications. In 6th USENIX Workshop on Hot Topics in Security, HotSec'11.
[35]
Eduard Fosch-Villaronga and Tobias Mahler. 2021. Cybersecurity, safety and robots: Strengthening the link between cybersecurity and safety in the context of care robots. Computer Law & Security Review 41 (2021), 105528.
[36]
Sanjam Garg and Mohammad Hajiabadi. 2018. Trapdoor functions from the computational Diffie-Hellman assumption. In Annual International Cryptology Conference. Springer, 362--391.
[37]
Romain Gay. 2020. A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials. In Public Key Cryptography (1). 95--120.
[38]
Shreyas Gokhale. 2020. JdeMultiBot: Multi-Robot exercises for Robotics Academy In ROS2. (2020).
[39]
Vipul Goyal, Abhishek Jain, Omkant Pandey, and Amit Sahai. 2008. Bounded Ciphertext Policy Attribute Based Encryption. In Automata, Languages and Programming, Luca Aceto, Ivan Damgård, Leslie Ann Goldberg, Magnús M. Halldórsson, Anna Ingólfsdóttir, and Igor Walukiewicz (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 579--591.
[40]
Object Management Group. 2018. DDS security [Online]. https://www.omg.org/ spec/DDS-SECURITY/1.1/PDF.
[41]
Object Management Group. 2018. The real-time publish-subscribe protocol (RTPS) DDS - OMG [Online]. https://www.omg.org/spec/DDSI-RTPS/2.3/Beta1/ PDF.
[42]
Charles Antony Richard Hoare. 1978. Communicating sequential processes. Commun. ACM 21, 8 (1978), 666--677.
[43]
Chi Hu, Wei Dong, Yonghui Yang, Hao Shi, and Ge Zhou. 2019. Runtime verification on hierarchical properties of ROS-based robot swarms. IEEE Transactions on Reliability 69, 2 (2019), 674--689.
[44]
Shengtuo Hu, Qi Alfred Chen, Jiachen Sun, Yiheng Feng, Z. Morley Mao, and Henry X. Liu. 2021. Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle Protocols. In 30th USENIX Security Symposium (USENIX Security 21). 3219--3236.
[45]
Syed Hussain, Omar Chowdhury, Shagufta Mehnaz, and Elisa Bertino. 2018. LTEInspector: A systematic approach for adversarial testing of 4G LTE. In Network and Distributed Systems Security (NDSS) Symposium 2018.
[46]
JdeRobot. 2020. JdeRobot: Open toolkit for developing Robotics applications. https://jderobot.github.io/.
[47]
Kelin Jose and Dilip Kumar Pratihar. 2016. Task allocation and collision-free path planning of centralized multi-robots system for industrial plant inspection using heuristic methods. Robotics and Autonomous Systems 80 (2016), 34--42.
[48]
Hwimin Kim, Dae-Kyoo Kim, and Alaa Alaerjan. 2021. ABAC-Based Security Model for DDS. IEEE Transactions on Dependable and Secure Computing (2021).
[49]
Hyungsub Kim, Muslum Ozgur Ozmen, Antonio Bianchi, Z. Berkay Celik, and Dongyan Xu. 2021. PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles. In 28th Annual Network and Distributed System Security Symposium, NDSS 2021, virtually, February 21--25, 2021. The Internet Society.
[50]
Misook Kim, SangGyu Kim, ByoungYoul Song, Young-sook Jeong, and Hong Seong Park. 2021. Study on Requirements of Cloud-based Environments for Easy Development of ROS Modules. In 2021 18th International Conference on Ubiquitous Robots (UR). 48--51.
[51]
N. Koenig and A. Howard. 2004. Design and use paradigms for Gazebo, an open-source multi-robot simulator. In 2004 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), Vol. 3. 2149--2154 vol.3.
[52]
Allison Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters. 2010. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. In Advances in Cryptology -- EUROCRYPT 2010, Henri Gilbert (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 62--91.
[53]
Hakan Lindqvist. 2006. Mandatory access control. Master's thesis in computing science, Umea University, Department of Computing Science, SE-901 87 (2006).
[54]
Yanan Liu, Yong Guan, Xiaojuan Li, Rui Wang, and Jie Zhang. 2018. Formal analysis and verification of DDS in ROS2. In 2018 16th ACM/IEEE International Conference on Formal Methods and Models for System Design (MEMOCODE). 1--5.
[55]
Yuya Maruyama, S. Kato, and Takuya Azumi. 2016. Exploring the performance of ROS2. 2016 International Conference on Embedded Software (EMSOFT) (2016), 1--10.
[56]
Petra Mazdin, Michal Barci, Hermann Hellwagner, and Bernhard Rinner. 2020. Distributed Task Assignment in Multi-Robot Systems based on Information Utility. In 2020 IEEE 16th International Conference on Automation Science and Engineering (CASE). 734--740.
[57]
Jarrod McClean, Christopher Stull, Charles Farrar, and David Mascareñas. 2013. A preliminary cyber-physical security assessment of the Robot Operating System (ROS). In Unmanned Systems Technology XV, Robert E. Karlsen, Douglas W. Gage, Charles M. Shoemaker, and Grant R. Gerhart (Eds.), Vol. 8741. International Society for Optics and Photonics, SPIE, 341 -- 348.
[58]
Jarrod R. Mcclean and Charles Farrar. 2013. A Preliminary Cyber-Physical Security Assessment of the Robot Operating System (ROS). In Proceedings of SPIE.
[59]
Michael Myers, Rich Ankney, Ambarish Malpani, Slava Galperin, and Carlisle Adams. 1999. X. 509 Internet public key infrastructure online certificate status protocol-OCSP. (1999).
[60]
Dang Tu Nguyen, Chengyu Song, Zhiyun Qian, Srikanth V Krishnamurthy, Edward JM Colbert, and Patrick McDaniel. 2018. IotSan: Fortifying the safety of IoT systems. In Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies. 191--203.
[61]
Open Source Robotics Foundation. 2021. Open Robotics. https://www. openrobotics.org/.
[62]
OpenRMF. 2022. Open-RMF/RMF Demos: Demonstrations of The OpenRMF software [Online]. https://github.com/open-rmf/rmf_demos
[63]
Gerardo Pardo-Castellote, Bert Farabaugh, and Rick Warren. 2005. An introduction to DDS and data-centric communications. Real-Time Innovations (2005).
[64]
Amir Pnueli. 1977. The temporal logic of programs. In 18th Annual Symposium on Foundations of Computer Science (sfcs 1977). 46--57.
[65]
Robert Reid, Andrew Cann, Calum Meiklejohn, Liam Poli, Adrian Boeing, and Thomas Braunl. 2013. Cooperative multi-robot navigation, exploration, mapping and object detection with ROS. In 2013 IEEE Intelligent Vehicles Symposium (IV). 1083--1088.
[66]
Ronald W Ritchey and Paul Ammann. 2000. Using model checking to analyze network vulnerabilities. In Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000. IEEE, 156--165.
[67]
Sean Rivera and Radu State. 2021. Securing Robots: An Integrated Approach for Security Challenges and Monitoring for the Robotic Operating System (ROS). In 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM). IEEE, 754--759.
[68]
Robotis. 2021. TurtleBot 3. https://www.turtlebot.com/.
[69]
ROS. 2020. ROS Index package list. https://index.ros.org/packages/.
[70]
Ros-Visualization. 2020. Ros-visualization/RQT_GRAPH. https://github.com/rosvisualization/rqt_graph.
[71]
ROS2. 2019. ROS 2 Foxy Elusor. https://docs.ros.org/en/eloquent/index.html.
[72]
ROS2. 2020. ROS 2 Foxy Fitzroy. https://docs.ros.org/en/foxy/Releases/ReleaseFoxy-Fitzroy.html.
[73]
ROS2. 2020. Set rtps_protection_kind to encrypt by default pull request #171 · ROS2/SROS2. https://github.com/ros2/sros2/pull/171.
[74]
ROS2. 2020. SROS2 Project Sample Policies. https://github.com/ros2/sros2/tree/ master/sros2/sros2/policy.
[75]
ROS2. 2021. ROS 2 Galatic Geochelone. https://docs.ros.org/en/galactic/index. html.
[76]
ROS2. 2021. SROS2. https://github.com/ros2/sros2.
[77]
ROS2. 2022. ROS 2 Rolling. https://docs.ros.org/en/rolling/index.html.
[78]
Amit Sahai and Brent Waters. 2005. Fuzzy Identity-Based Encryption. In Advances in Cryptology -- EUROCRYPT 2005, Ronald Cramer (Ed.). 457--473.
[79]
Joseph Salowey, Abhijit Choudhury, and David McGrew. 2008. AES Galois Counter Mode (GCM) cipher suites for TLS. Request for Comments 5288 (2008).
[80]
Amazon Web Services. 2021. AWS Robotics. https://aws.amazon.com/ robomaker/.
[81]
Ryan Shah and Shishir Nagaraja. 2019. Privacy with Surgical Robotics: Challenges in Applying Contextual Privacy Theory. CoRR abs/1909.01862 (2019). arXiv:1909.01862 http://arxiv.org/abs/1909.01862
[82]
Alireza Souri, Amir Masoud Rahmani, Nima Jafari Navimipour, and Reza Rezaei. 2019. A symbolic model checking approach in formal verification of Distributed Systems. Human-centric Computing and Information Sciences 9, 1 (2019). https: //doi.org/10.1186/s13673-019-0165-x
[83]
Bernd Carsten Stahl and Mark Coeckelbergh. 2016. Ethics of healthcare robotics: Towards responsible research and innovation. Robotics and Autonomous Systems 86 (2016), 152--161.
[84]
Jun Sun, Yang Liu, and Jin Song Dong. 2008. Model Checking CSP Revisited: Introducing a Process Analysis Toolkit. In Leveraging Applications of Formal Methods, Verification and Validation, Tiziana Margaria and Bernhard Steffen (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 307--322.
[85]
Jun Sun, Yang Liu, Jin Song Dong, and Chunqing Chen. 2009. Integrating specification and programs for system modeling and verification. In 2009 Third IEEE International Symposium on Theoretical Aspects of Software Engineering. 127--135.
[86]
Rafael R. Teixeira, Igor P. Maurell, and Paulo L.J. Drews. 2020. Security on ROS: analyzing and exploiting vulnerabilities of ROS-based systems. In 2020 Latin American Robotics Symposium (LARS), 2020 Brazilian Symposium on Robotics (SBR) and 2020 Workshop on Robotics in Education (WRE). 1--6.
[87]
Andrea Testa, Andrea Camisa, and Giuseppe Notarstefano. 2021. ChoiRbot: A ROS 2 Toolbox for Cooperative Robotics. IEEE Robotics and Automation Letters 6, 2 (2021), 2714--2720.
[88]
Víctor Vilches, Gorka Olalde, Xabier Baskaran, Alejandro Cordero, Lander Juan, Endika Gil-Uriarte, Odei Urabain, and Laura Kirschgens. 2018. Aztarna, a footprinting tool for robots.
[89]
Brent Waters. 2011. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization. In Public Key Cryptography -- PKC 2011, Dario Catalano, Nelly Fazio, Rosario Gennaro, and Antonio Nicolosi (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 53--70.
[90]
Ruffin White, Henrik I. Christensen, Gianluca Caiazza, and Agostino Cortesi. 2018. Procedurally Provisioned Access Control for Robotic Systems. In 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).
[91]
Yuan Xu, Gelei Deng, Tianwei Zhang, Han Qiu, and Yungang Bao. 2021. Novel denial-of-service attacks against cloud-based multi-robot systems. Information Sciences 576 (2021), 329--344. https://www.sciencedirect.com/science/article/pii/ S002002552100654X
[92]
Yuan Xu, Tianwei Zhang, and Yungang Bao. 2021. Analysis and Mitigation of Function Interaction Risks in Robot Apps. 24th International Symposium on Research in Attacks, Intrusions and Defenses (2021).
[93]
Fabian Yamaguchi, Nico Golde, Daniel Arp, and Konrad Rieck. 2014. Modeling and Discovering Vulnerabilities with Code Property Graphs. In 2014 IEEE Symposium on Security and Privacy. 590--604.
[94]
Shucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou. 2010. Attribute Based Data Sharing with Attribute Revocation. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (Beijing, China) (ASIACCS '10). Association for Computing Machinery, New York, NY, USA, 261--270.
[95]
Yizhe Zhang, Lianjun Li, Michael Ripperger, Jorge Nicho, Malathi Veeraraghavan, and Andrea Fumagalli. 2018. Gilbreth: A Conveyor-Belt Based Pick-and-Sort Industrial Robotics Application. In 2018 Second IEEE International Conference on Robotic Computing (IRC). 17--24.
[96]
Huiquan Zhu, Jing Sun, Jin Song Dong, and Shang-Wei Lin. 2015. From verified model to executable program: The Pat Approach. Innovations in Systems and Software Engineering 12, 1 (2015), 1--26.

Cited By

View all
  • (2024)Formal Analysis and Detection for ROS2 Communication Security VulnerabilityElectronics10.3390/electronics1309176213:9(1762)Online publication date: 2-May-2024
  • (2024)Differential Fuzzing for Data Distribution Service Programs with Dynamic ConfigurationProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695073(807-818)Online publication date: 27-Oct-2024
  • (2024)DDS Security+: Enhancing the Data Distribution Service With TPM-based Remote AttestationProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670442(1-11)Online publication date: 30-Jul-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
November 2022
3598 pages
ISBN:9781450394505
DOI:10.1145/3548606
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 November 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. protocol vulnerability
  2. robot operating system
  3. verification

Qualifiers

  • Research-article

Funding Sources

  • Ministry of Education, Singapore
  • Singapore National Research Foundation
  • Ministry of Education, Singapore
  • NTU-DESAY SV Research Program

Conference

CCS '22
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)410
  • Downloads (Last 6 weeks)51
Reflects downloads up to 07 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Formal Analysis and Detection for ROS2 Communication Security VulnerabilityElectronics10.3390/electronics1309176213:9(1762)Online publication date: 2-May-2024
  • (2024)Differential Fuzzing for Data Distribution Service Programs with Dynamic ConfigurationProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695073(807-818)Online publication date: 27-Oct-2024
  • (2024)DDS Security+: Enhancing the Data Distribution Service With TPM-based Remote AttestationProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670442(1-11)Online publication date: 30-Jul-2024
  • (2024)Blockchain-Based Dynamic Time-Encapsulated Data Auditing for Outsourcing StorageIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.333848519(1979-1993)Online publication date: 1-Jan-2024
  • (2024)Performance Evaluation of a Prototype UAV-Based Secure Communication System Employing ROS and Chaotic Communications2024 International Conference on Unmanned Aircraft Systems (ICUAS)10.1109/ICUAS60882.2024.10556964(1034-1041)Online publication date: 4-Jun-2024
  • (2024)Defending Against APT Attacks in Robots: A Multi-phase Game-Theoretical ApproachDecision and Game Theory for Security10.1007/978-3-031-74835-6_14(287-305)Online publication date: 16-Oct-2024
  • (2024)The Security Analysis of ROS2 CommunicationSecurity and Privacy in Communication Networks10.1007/978-3-031-64954-7_7(122-139)Online publication date: 15-Oct-2024
  • (2023)Runtime Verification for Trustworthy ComputingElectronic Proceedings in Theoretical Computer Science10.4204/EPTCS.391.7391(49-62)Online publication date: 30-Sep-2023
  • (2023)EGIA: An External Gradient Inversion Attack in Federated LearningIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.330216118(4984-4995)Online publication date: 1-Jan-2023

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media