Academic Research

Introduction

Introduction

Categories

The following list is not exhaustive and for discussion and a way to organize the various works in a preliminary form. It is supposed to help understanding what type of research is being done already, for cybersecurity and robotics researchers to easily find their way and in order to identify potential gaps in research domains. The identified research has been categorized accordingly from a high level perspective and will in many cases touch upon multiple categories.

  • Holostic & Risk perspectives – General & Introductionary
  • Technology :
    • Physical Safety & Security
    • Industrial Control Systems
    • Communication Layer
    • Operating Systems (incl ROS)
    • Identity, Authentication and Access Control
    • Programming – Application Security
    • Data and Funtional Integrity
    • Crypto
    • Trusted Execution Environments
    • Attacks and Exploits
    • Monitoring & Incident Management
  • Industry Vertical related research
  • Management :
    • Methods, Methodologies & Standards
  • Legal, Societal, Ethical
  • Market Research Studies

TECHNOLOGY

Under the technology research heading we have categorized research with a particular technology research focus, related to underlying technologies such as safety and security measures, industrial control systems, communication layers, … versus management, legal, ethics and market research.

Physical Safety & Security

Laura Alzola Kirschgens, Irati Zamalloa Ugarte, Endika Gil Uriarte, Aday Muniz Rosas , V´ıctor Mayoral Vilches – ROBOT HAZARDS: FROM SAFETY TO SECURITY – arXiv® is a registered trademark of Cornell University (https://arxiv.org/abs/1806.06681v3) September 2019

Holistic & Risk Perspectives – General & Introductionary

Ryan Shah – Security Landscape for Robotics – arXiv® is a registered trademark of Cornell University (https://arxiv.org/abs/1904.03033v1) April 2019

Khalil M. Ahmad Yousef, Anas AlMajali, Salah Abu Ghalyon, Waleed Dweik and Bassam J. Mohd – Analyzing Cyber-Physical Threats on Robotic Platforms -Sensors 2018, 18(5), 1643

Anas AlMajali, Khalil M. Ahmad Yousef, Bassam J. Mohd, Waleed Dweik, Salah Abu Ghalyon and Roa’a Hasan – SEMI-QUANTITATIVE SECURITY RISK ASSESSMENT OF ROBOTIC SYSTEMS – Jordanian Journal of Computers and Information Technology (JJCIT), Vol. 04, No. 03, December 2018.

George W. Clark Jr., Michael V. Doran, Todd R. Andel – Cybersecurity Issues in Robotics – 2017 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA)

George W. Clark Jr., Michael V. Doran, Todd R. Andel – Cybersecurity Issues in Robotics – 2017 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA)

Vicente Matellán, Tamara Bonaci, Giedre Sabaliauskaite – Cyber-security in robotics and autonomous systems – 0921-8890/© 2017 Elsevier B.V. All rights reserved.

Industrial Control Systems

Byres, E., Dr, P. E., & Hoffman, D. (2004).The myths and facts behind cyber security risks for industrial control systems. In Proc. of VDE Kongress.

Fairley, P. (2016). Cybersecurity at u.s. utilities due for an upgrade: Tech to detect intrusions into industrial control systems will be mandatory [news]. IEEE Spectrum, 53(5), 11–13.

Karnouskos, S. (2011). Stuxnet worm impact on industrial cyber-physical system security. In 37th Annual Conference of the IEEE Industrial Electronics Society (IECON 2011)(pp. 4490–4494).

Nelson, N. (2016). The Impact of Dragonfly Malware on Industrial Control Systems.Technical report, SANS Institute.

Stouffer, K., Pillitteri, V., Lightman, S., Abrams, M., & Hahn, A. (2015).Guide to Industrial Control Systems (ICS) Security. Technical report, National Institute of Standards and Technology. NIST Special Publication 800-82, Revision 2.

Operating Systems

Breiling, B., Dieber, B., & Schartner, P. (2017). Secure communication for the robot operating system. In 11th Annual IEEE International Systems Conference, SysCon 2017 – Proceedings. https://doi.org/10.1109/SYSCON.2017.7934755

Dieber, B., Breiling, B., Taurer, S., Kacianka, S., Rass, S., & Schartner, P. (2017). Security for the Robot Operating System. Robotics and Autonomous Systems.

Dieber, B., White, R., Taurer, S., Breiling, B., Caiazza, G., Christensen Henrikand, & Cortesi Agostino. (2019). Penetration testing ROS. In Anis Koubaa (Ed.), Robot Operating System (ROS) – The complete reference vol. 4. Springer.

McClean, J., Stull, C., Farrar, C., & Mascareñas, D. (2013). A preliminary cyber-physical security assessment of the Robot Operating System (ROS). In Proc. SPIE (Vol. 8741, pp. 874110–874118). https://doi.org/10.1117/12.2016189

Identity, Authentication and Access Control

R. White, H. I. Christensen, G. Caiazza and A. Cortesi, “Procedurally Provisioned Access Control for Robotic Systems,” 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), Madrid, 2018, pp. 1-9.
doi: 10.1109/IROS.2018.8594462

Programming

Bernhard Dieber, Benjamin Breiling. Security considerations in modular mobile manipulation. IRC2019, 2019.

Data and Functional Integrity

Taurer, S., Dieber, B., & Schartner, P. (2018). Secure data recording and bio-inspired functional integrity for intelligent robots. In Proceedings of the 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2018).

Marcello Pogliani, Davide Quarta, Mario Polino, Martino Vittone, Federico Maggi, Stefano Zanero- Security of controlled manufacturing systems in the connected factory: the case of industrial robots – Journal of Computer Virology and Hacking Techniques (2019) 15:161–175

Anas AlMajali, Khalil M. Ahmad Yousef, Bassam J. Mohd, Waleed Dweik, Salah Abu Ghalyon and Roa’a Hasan – SEMI-QUANTITATIVE SECURITY RISK ASSESSMENT OF ROBOTIC SYSTEMS – Jordanian Journal of Computers and Information Technology (JJCIT), Vol. 04, No. 03, December 2018.

Attacks & Exploits

Cesar Cerrudo, Lucas Apa – Hacking Robots Before Skynet – https://ioactive.com/hacking-robots-before-skynet/

Davide Quarta, Marcello Pogliani, Mario Polino, Andrea M. Zanchettin, and Stefano Zanero – Rogue Robots: Testing the Limits of an Industrial Robot’s Security – ©2017 by Trend Micro, Incorporated. TrendLabs Research Paper (March 2017

Monitoring & Incident Management

White, R., Caiazza, G., Cortesi, A., Im Cho, Y., & Christensen, H. I. (2019). Black Block Recorder: Immutable Black Box Logging for Robots via Blockchain. IEEE Robotics and Automation Letters, 4(4), 3812-3819.

Management

f

Industry Vertical Related Research

] Shusuke Morimoto, Fang Wang, Ranchao Zhang, Jinghui Zhu – Cybersecurity in Autonomous Vehicles – INTRODUCTION TO APPLIED INFORMATICS, UNIVERSITY OF HYOGO, MAY 2017

Methods, Methodologies, Standards

Víctor Mayoral Vilches, Laura Alzola Kirschgens, Asier Bilbao Calvo, Alejandro Hernández Cordero, Rodrigo Izquierdo Pisón, David Mayoral Vilches, Aday Muñiz Rosas, Gorka Olalde Mendia, Lander Usategi San Juan, Irati Zamalloa Ugarte, Endika Gil-Uriarte, Erik Tews, Andreas Peter – Introducing the Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics – Ledger Journal – 2019 (10.5195/LEDGER.201X.X)

Legal, Societal, Ethical

Francisco J. Rodríguez Lera, Camino Fernández Llamas, Ángel Manuel Guerrero and Vicente Matellán Olivera – Cybersecurity of Robotics and Autonomous Systems: Privacy and Safety – Robotics – V Chapter of Legal, Ethical and Socioeconomic Impacts Edited by George Dekoulis – 2017