Adding salt to pepper a structured security assessment over a humanoid robot: A Structured Security Assessment over a Humanoid Robot

Alberto Giaretta, Michele De Donno, Nicola Dragoni

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

785 Downloads (Pure)

Abstract

The rise of connectivity, digitalization, robotics, and artificial intelligence (AI) is rapidly changing our society and shaping its future development. During this technological and societal revolution, security has been persistently neglected, yet a hacked robot can act as an insider threat in organizations, industries, public spaces, and private homes. In this paper, we perform a structured security assessment of Pepper, a commercial humanoid robot. Our analysis, composed by an automated and a manual part, points out a relevant number of security flaws that can be used to take over and command the robot. Furthermore, we suggest how these issues could be fixed, thus, avoided in the future. The very final aim of this work is to push the rise of the security level of IoT products before they are sold on the public market.
Original languageEnglish
Title of host publicationProceedings of 13th International Conference on Availability, Reliability and Security,
PublisherAssociation for Computing Machinery
Publication date2018
Article number3232807
ISBN (Print)9781450364485
DOIs
Publication statusPublished - 2018
Event13th International Conference on Availability, Reliability and Security - University of Hamburg, Hamburg, Germany
Duration: 27 Aug 201830 Aug 2018
Conference number: 13
https://2018.ares-conference.eu/

Conference

Conference13th International Conference on Availability, Reliability and Security
Number13
LocationUniversity of Hamburg
Country/TerritoryGermany
CityHamburg
Period27/08/201830/08/2018
Internet address

Keywords

  • Security assessment
  • Security level
  • Internet of things
  • Penetration Testing

Fingerprint

Dive into the research topics of 'Adding salt to pepper a structured security assessment over a humanoid robot: A Structured Security Assessment over a Humanoid Robot'. Together they form a unique fingerprint.

Cite this