Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas...

53
Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar 15.4.2014

Transcript of Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas...

Page 1: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Domestic Robotsa case study on security in ubiquitous computing

Thomas KnellUbiquitous Computing Seminar15.4.2014

Page 2: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

! Any automatically operated machine that replaces human effort, though it may not resemble human beings in appearance or perform functions in a humanlike manner. – Encyclopaedia Britannica

! A robot is a cyber-physical system with sensors, actuators and mobility. – A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons, T. Denning et al.

! I can't define a robot, but I know one when I see one. – Joseph Engelberger (pioneer in industrial robotics)

Defining Robot

There exists no universally accepted definition of a robot

2

Page 3: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Example 1: Cleaning Robots

Roomba MyWindoro

3

Page 4: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Example 2: PR2

PR2 is a robotics research and development platform that lets you innovate right out of the box. No more building hardware and software from scratch. http://www.willowgarage.com/pages/pr2/overview

4

Page 5: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Example 3: Atlas

Atlas is a high mobility, humanoid robot designed to operate outdoors, even on extremely rough terrain. http://www.bostondynamics.com/robot_Atlas.html

5

Page 6: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Perception of Robots

! Survey from 2007! 240 Participants

What do people expect from robots?, C. Ray et al.6

Page 7: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Stakeholder expectations

! New appliance: The household robot

! Users may have:− Incorrect preconceptions− No point of reference to understand the robot

! Designers will have to either:− Create very intuitive products, or− Integrate training course

A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons, T. Denning et al.7

Page 8: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

What is Security?

! Security:− Systems behave as intended

even in the presence of an adversary

! Safety:− Systems behave as intended

even in the presence of accidental failures

8

Page 9: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Network Security Goals

! Confidentiality− Encryption

! Integrity− MAC, Digital Signature

! Availability− Redundancy, more Bandwidth

And More:! Authentication! Accountability! Non-repudiation! Privacy

Network Security, Bernhard Plattner9

Page 10: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Secure Communication Channel

! Confidential channel− No eavesdropping possible on information sent

! Authentic channel − Sender is the one he claims to be and− Content is original

! Secure channel− Authentic and confidential channel

Network Security, Bernhard Plattner10

Page 11: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Attack Classification

Passive attacks

Confidentiality

Traffic analysisCompromiseof content

Active attacks

Availability Integrity andAuthenticity

Denial ofservice

Modification

Fabrication

Replay

Classification due to Steve Kent, BBN Technologies11

Page 12: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Timeline: Computers

The Future of Household Robots, T. Denning

1951UNIVAC

1946ENIAC

1944Colossus

12

Page 13: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Timeline: Computers

The Future of Household Robots, T. Denning

1974Altair 8800

1977Apple II

1981IBM PC

1982Commodore 64

1984Apple Macintosh

13

Page 14: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Timeline: Computers

The Future of Household Robots, T. Denning14

Page 15: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Timeline: Computer Security Attacks

1960-1970Phone Phreaking

The Future of Household Robots, T. Denning15

Page 16: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Timeline: Computer Security Attacks

The Future of Household Robots, T. Denning

1980sThe 414s break into 60 Computer systems

16

Page 17: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Timeline: Computer Security Attacks

1986“The Brain” Virus

The Future of Household Robots, T. Denning17

Page 18: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Timeline: Computer Security Attacks

1988Morris Worm

The Future of Household Robots, T. Denning18

Page 19: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Timeline: Computer Security Attacks

The Future of Household Robots, T. Denning

2000sDDoS Attacks

19

Page 20: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Timeline: Computer Security Attacks

The Future of Household Robots, T. Denning20

! Rootkits! Trojan Horses! Botnets! Phishing! Keyloggers! Cross-Site Scripting! etc.

Page 21: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Timeline: Computer Security Attacks

Observations:! The attack rate increases! The attacks lag behind the technology

The Future of Household Robots, T. Denning21

Page 22: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Timeline: Robots

The Future of Household Robots, T. Denning

1979Robotics Institute founded at Carnegie Mellon University

22

Page 23: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Timeline: Robots

The Future of Household Robots, T. Denning

1982WABOT-2 accompanies people on a keyboard instrument

23

Page 24: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Timeline: Robots

The Future of Household Robots, T. Denning

1986Honda founds Humanoid Robot Division

24

Page 25: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Timeline: Robots

The Future of Household Robots, T. Denning25

1999AIBO

Page 26: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Timeline: Robots

The Future of Household Robots, T. Denning26

2000ASIMO

Page 27: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Timeline: Robots

The Future of Household Robots, T. Denning27

2001Paro therapeutic seal

Page 28: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Timeline: Robots

The Future of Household Robots, T. Denning

2002Roomba

28

Page 29: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Timeline: Robots

The Future of Household Robots, T. Denning

2005Actroid Android

29

Page 30: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Timeline: Robots

The Future of Household Robots, T. Denning

2008Okonomiyaki Robot

30

Page 31: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Timeline: Robots

Observations:! No large-scale attacks on robot security yet

Recall (computer security):! The attack rate increases! The attacks lag behind the technology

The Future of Household Robots, T. Denning31

Page 32: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons

32

Page 33: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Rovio

! For adults! Telepresence! Home surveillance! Check up on relatives! Follows pre-programmed

IR beacons! Controlled via web interface

33

Page 34: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Spykee

! Toy for children! Assembled and configured

by children! Telepresence: Parent can

tuck in kids when out of town

! “Spy” robot! Controlled via program

34

Page 35: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Discovered Vulnerabilities

35

Page 36: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Remote Discovery

A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons, T. Denning et al.36

Page 37: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Eavesdropping

Neighbor or Hacker in a car

A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons, T. Denning et al.37

Page 38: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Intercepting Credentials (MITM)

A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons, T. Denning et al.

Can intercept login credentials

www.spykeeworld.com

38

Page 39: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Physical Takeover

! With credentials: Drive the robot anywhere

! Access the AV stream at any time

39

Page 40: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Possible Attacks

! Robot vandalism− Damage fragile object− Knock object off of a table− Damaging the robot itself (robot suicide)

! Manipulate Objects− Use mobility to locate (physical) key

− Take image of a key− Pick up and hide key

! Eldercare− Robot used to trip an elder− Play noises and speech to confuse elder

A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons, T. Denning et al.40

Page 41: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Mechatronic Security and

Robot Authentication

41

Page 42: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Robot as Living Individuals

! Born at some point− Has non-clonable DNA− Gets a birth certificate

! Starts usual transactions with its environment− Learning, developing its knowledge and capabilities

! Gets old− Has to be repaired, or− dies

Mechatronic Security and Robot Authentication, W. Adi42

Page 43: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

! Biological mutation− Permanent irremovable change

! Electronic mutation − Simulated change

! e-DNA− Generate e-DNA chain from e-Mutation

Bio-Inspired Robot Identity

Mechatronic Security and Robot Authentication, W. Adi43

Page 44: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Detecting Cloning Attack

! Cloning almost impossible− Crack mutated identity− Copy all robot transactions history

! Detect Cloning Attack− Two G units with same properties− Each unit G generates new trace− G' and G'' most likely different− Both systems claim to be G �− Identification process will fail

Mechatronic Security and Robot Authentication, W. Adi44

Page 45: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Mechatronic Security Goals

! Robot is provable witness of event

! Robot can prove having performed action

! Robot cannot falsly claim to have performed action

45

Page 46: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Risks of Tomorrow

46

Page 47: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Risks of Tomorrow

! Robots for elders− Exoskeleton for mobility− Lifting robot

47

Page 48: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Risks of Tomorrow

! Robots for elders− Exoskeleton for mobility− Lifting robot

! Robots for children− As companions or as therapy

for unique emotional needs

48

Page 49: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Risks of Tomorrow

! Robots for elders− Exoskeleton for mobility− Lifting robot

! Robots for children− As companions or as therapy

for unique emotional needs! Robots that use tools

49

Page 50: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Risks of Tomorrow

! Robots for elders− Exoskeleton for mobility− Lifting robot

! Robots for children− As companions or as therapy

for unique emotional needs! Robots that use tools! Robots with sophisticated A.I.

50

Page 51: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Are the Risks real?

Potential types of attackers! Terrorists! Competitor! Acquaintance! ID Thief! Prankster! Governments

51

Page 52: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Conclusion

! Spykee and Rovio robots are “only” toys − Security not first priority− Vulnerabilities not specific to robots

Can be easily fixed

! Future robots more complex− Even developers don't understand reasons for behavior− Difficult to detect an enemy's attack− How to prevent the robot from leaking information?

! Young area of research− Lack of detailed studies− Difficult to predict technology

52

Page 53: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982

Questions?

53