Christopher Archibald, Luke Schwalm, and John E. Ball
[1] T. Denning, C. Matuszek, K. Koscher, J.R. Smith, andT. Kohno, A spotlight on security and privacy risks with futurehousehold robots: Attacks and lessons, Proc. 11th Intl. Conf.on Ubiquitous Computing, ACM, Orlando, Florida, USA, 2009,105–114. [2] C. Armbrust, S.A. Mehdi, M. Reichardt, J. Koch, and K. Berns,Using an autonomous robot to maintain privacy in assistiveenvironments, Security and Communication Networks, 4(11),2011, 1275–1293. [3] iRobot roomba vacuum cleaning robot, http://www.irobot.com/For-the-Home/Vacuum-Cleaning/Roomba.aspx (accessedJun. 30, 2015). [4] General atomics aeronautical – Predator B UAS, http://www.ga-asi.com/predator-b (accessed Jun. 30, 2015). [5] Draganfly guardian, http://www.draganfly.com/uav-helicopter/draganflyer-guardian/ (accessed Jun. 30, 2015). [6] F. Higgins, A. Tomlinson, and K.M. Martin, Survey on securitychallenges for swarm robotics, Autonomic and AutonomousSystems, 2009. ICAS’09, Fifth Intl. Conf. on, IEEE, Valencia,Spain, 2009, 307–312. [7] A.M. Wyglinski, X. Huang, T. Padir, L. Lai, T.R. Eisenbarth,and K. Venkatasubramanian, Security of autonomous systemsemploying embedded computing and sensors, Micro, IEEE,33(1), 2013, 80–86. [8] K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno,S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham,et al., Experimental security analysis of a modern automobile,Security and Privacy (SP), 2010 IEEE Symposium on, IEEE,Oakland, California, USA, 2010, 447–462. [9] A. Wyglinski, X. Huang, T. Padir, L. Lai, T. Eisenbarth,and K. Venkatasubramanian, “Security of autonomous systemsemploying embedded computing and sensors, Micro, IEEE,33, 2013, 80–86. [10] F. Higgins, A. Tomlinson, and K.M. Martin, Threats to theswarm: security considerations for swarm robotics, Interna-tional Journal on Advances in Security, 2(2–3), 2009, 288–297. [11] S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham,S. Savage, K. Koscher, A. Czeskis, F. Roesner, T. Kohno,et al., Comprehensive experimental analyses of automotiveattack surfaces, USENIX Security Symposium, San Francisco,2011. [12] E. Ya˘gdereli, C. Gemci, and A.Z. Akta¸s, A study on cyber-security of autonomous and unmanned vehicles, The Journal ofDefense Modeling and Simulation: Applications, Methodology,Technology, 12(4), 2015, 369–381. [13] A. Francillon, B. Danev, and S. Capkun, Relay attacks onpassive keyless entry and start systems in modern cars, Net-work and Distributed System Symposium (NDSS), San Diego,California, USA, 2011. [14] T. Denning, T. Kohno, and H.M. Levy, Computer securityand the modern home, Communications of the ACM, 56(1),2013, 94–103. [15] N. Bezzo, J. Weimer, M. Pajic, O. Sokolsky, G. J. Pappas,and I. Lee, Attack resilient state estimation for autonomousrobotic systems, Intelligent Robots and Systems (IROS 2014),2014 IEEE/RSJ Intl. Conf. on, IEEE, Chicago, Illinois, USA,2014, 3692–3698. [16] Todd humphreys’ research team demonstrates first successfulGPS spoofing of uav, http://www.ae.utexas.edu/news/features/todd-humphreys-research-team-demonstrates-first-successful-gps-spoofing-of-uav (accessed Jul. 01, 2015). [17] S. Peterson and P. Faramarzi, Exclusive: Iran hijacked us drone,says iranian engineer, http://www.csmonitor.com/World/Middle-East/2011/1215/Exclusive-Iran-hijacked-US-drone-says-Iranian-engineer-Video (accessed Jul. 08, 2015). [18] Humphreys research group successfully spoofs an $80 mil-lion yacht at sea, http://www.ae.utexas.edu/news/features/humphreys-research-group (accessed Jul. 01, 2015). [19] Y. Shoukry, P. Martin, P. Tabuada, and M. Srivastava, Non-invasive spoofing attacks for anti-lock braking systems, Cryp-tographic Hardware and Embedded Systems-CHES 2013, SantaBarbara, California, USA, Springer, 2013, 55–72. [20] K.D. Akdemir, D. Karakoyunlu, T. Padir, and B. Sunar,Trusted Systems: Second Intl. Conf., INTRUST 2010, Beijing,China, December 13–15, 2010, Revised Selected Papers, ch. AnEmerging Threat: Eve Meets a Robot, 271–289. (Berlin,Heidelberg: Springer Berlin Heidelberg, 2011). [21] R. Ishtiaq, R. Miller, H. Mustafa, T. Taylor, S. Oh, W. Xu,M. Gruteser, W. Trappe, and I. Seskar, Security and privacy155vulnerabilities of in-car wireless networks: A tire pressure mon-itoring system case study, 19th USENIX Security Symposium,Washington DC, Washington DC, USA, 2010, 11–13. [22] S. Yong, D. Lindskog, R. Ruhl, and P. Zavarsky, Risk miti-gation strategies for mobile wi-fi robot toys from online pe-dophiles, Privacy, Security, Risk and Trust (PASSAT) and2011 IEEE 3rd Intl. Conf. on Social Computing (SocialCom),2011 IEEE Third International Conference on, IEEE, Boston,Massachusetts, USA, 2011, 1220–1223. [23] P. Kleberger, T. Olovsson, and E. Jonsson, Security aspects ofthe in-vehicle network in the connected car, Intelligent VehiclesSymposium (IV), 2011 IEEE, IEEE, Baden-Baden, Germany,2011, 528–533. [24] J. Billig, Y. Danilchenko, and C.E. Frank, Evaluation of googlehacking, Proc. 5th Annual Conf. on Information SecurityCurriculum Development, InfoSecCD ’08, New York, NY, USA,ACM, 2008, 27–32. [25] T. Bonaci and H.J. Chizeck, On potential security threatsagainst rescue robotic systems, Safety, Security, and RescueRobotics (SSRR), 2012 IEEE International Symposium on,IEEE, College Station, Texas, USA, 2012, 1–2. [26] J. McClean, C. Stull, C. Farrar, and D. Mascare˜nas, Apreliminary cyber-physical security assessment of the robotoperating system (ros), SPIE Defense, Security, and Sensing,Baltimore, Maryland, USA, 2013, 874110–874110. [27] T. Bonaci, J. Yan, J. Herron, T. Kohno, and H.J. Chizeck,Experimental analysis of denial-of-service attacks on teleop-erated robotic systems, Proc. ACM/IEEE Sixth Intl. Conf.on Cyber-Physical Systems, ACM, Seattle, Washington, USA,2015, 11–20. [28] T. Vuong, A. Filippoupolitis, G. Loukas, and D. Gan, Physi-cal indicators of cyber attacks against a rescue robot, Perva-sive Computing and Communications Workshops (PERCOMWorkshops), 2014 IEEE Intl. Conf. on, IEEE, Budapest,Hungary, 2014, 338–343. [29] J. Borenstein and K. Miller, Robots and the internet: Causesfor concern, Technology and Society Magazine, IEEE, 32(1),2013, 60–65. [30] K. Caine, S. Sabanovic, and M. Carter, The effect of monitoringby cameras and robots on the privacy enhancing behaviorsof older adults, Human-Robot Interaction (HRI), 2012 7thACM/IEEE Intl. Conf. on, Boston, Massachusetts, USA, 2012,343–350. [31] M.K. Lee, K. Tang, J. Forlizzi, and S. Kiesler, Understand-ing users! perception of privacy in human-robot interaction,Human-Robot Interaction (HRI), 2011 6th ACM/IEEE Intl.Conf. on, Lausanne, Switzerland, 2011, 181–182. [32] Iran–u.s. rq-170 incident. https://en.wikipedia.org/wiki/Iran(accessed Jul. 08, 2015). [33] A. Wright, Hacking cars, Communications of the ACM, 54(11),2011, 18–19. [34] S. Gorman, Y.J. Dreazen, and A. Cole, Insurgents hack USdrones, http://online.wsj.com/articles/SB126102247889095011(accessed Jun. 30, 2015). [35] Z. Guo, D. Zeckzer, P. Liggesmeyer, and O. Maeckel, Identi-fication of security-safety requirements for the outdoor robotravon using safety analysis techniques, Software EngineeringAdvances (ICSEA), 2010 Fifth Intl. Conf. on, Nice, France,2010, 508–513. [36] T. Okubo, N. Yoshioka, and H. Kaiya, Security driven re-quirements refinement and exploration of architecture withmultiple NFR points of view, High-Assurance Systems Engi-neering (HASE), 2014 IEEE 15th International Symposiumon, Miami, Florida, USA, 2014, 201–205. [37] M. Finnicum and S.T. King, Building secure robot applications,Proceedings of the 6th USENIX Conference on Hot Topics inSecurity (HotSec), San Francisco, California, USA, 2011, 1–1. [38] B. Berg, Data protection on the move: Current developmentsin ICT and privacy/data protection, Mind the air gap, 1–24.(Dordrecht: Springer Netherlands, 2016). [39] T. Kohno and B.D. Johnson, Science fiction prototyping andsecurity education: Cultivating contextual and societal think-ing in computer security education and beyond, Proc. 42ndACM Technical Symposium on Computer Science Education,SIGCSE ’11, New York, NY, USA, ACM, 2011, 9–14. [40] M.R. Calo, Peeping hals, Artificial Intelligence, 175 (5–6),2011, 940–941, 2011. Special Review Issue. [41] D.K. Nilsson and U.E. Larson, Secure firmware updates overthe air in intelligent vehicles, Communications Workshops,2008. ICC Workshops’ 08. IEEE Intl. Conf. on, IEEE, Beijing,China, 2008, 380–384. [42] M. Roesch, et al., Snort: Lightweight intrusion detection fornetworks, LISA, 99, 1999, 229–238. [43] M. L. Psiaki, B.W. O’Hanlon, J. Bhatti, D.P. Shepard, T.E.Humphreys, et al., GPS spoofing detection via dual-receivercorrelation of military signals, Aerospace and Electronic Sys-tems, IEEE Transactions on, 49(4), 2013, 2250–2267. [44] F. Dovis, X. Chen, A. Cavaleri, K. Ali, and M. Pini, Detectionof spoofing threats by means of signal parameters estimation,Proc. 24th Intl. Technical Meeting of the Satellite Division ofthe Institute of Navigation (ION GNSS 2011), 2001, 416–421. [45] M. Pini, M. Fantino, A. Cavaleri, S. Ugazio, and L.L. Presti,Signal quality monitoring applied to spoofing detection, Proc.24th Intl. Technical Meeting of the Satellite Division of theInstitute of Navigation (ION GNSS 2011), Salt Lake City,Utah, USA, 2001, 1888–1896. [46] D.K. Nilsson and U.E. Larson, Conducting forensic investi-gations of cyber attacks on automobile in-vehicle networks,Proc. 1st Intl. Conf. on Forensic Applications and Tech-niques in Telecommunications, Information, and Multimediaand Workshop, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), Adelaide,Australia, 2008, 8. [47] S. Jana, A. Narayanan, and V. Shmatikov, A scanner darkly:Protecting user privacy from perceptual applications, Securityand Privacy (SP), 2013 IEEE Symposium on, IEEE, SanFrancisco, California, USA, 2013, 349–363. [48] N. Raval, L. Cox, A. Srivastava, A. Machanavajjhala, andK. Lebeck, Markit: Privacy markers for protecting visualsecrets, Proc. 2014 ACM Intl. Joint Conf. on Pervasive andUbiquitous Computing: Adjunct Publication, ACM, Seattle,Washington, USA, 2014, 448–455. [49] A. Kannammal and S.S. Rani, Authentication and encryptionfor medical image security system, International Journal ofRobotics and Automation, 29(4), 2014, 448–455. [50] G.S. Lee and B. Thuraisingham, Cyberphysical systems secu-rity applied to telesurgical robotics, Computer Standards &Interfaces, 34(1), 2012, 225–229. [51] A.P. Otero, R. Su´arez, J.M.R. Varas, M. Su´arez, M.P.A.G.Fuente, R. Fern´andez, M.R. Fern´andez, and I.G. Alonso,Integration of digital home, smart appliances and service robotsusing dhcompliant 2.0, International Journal of Robotics andAutomation, 30(4), 2015. [52] W.K. Edwards and R.E. Grinter, At home with ubiquitouscomputing: Seven challenges, Ubicomp 2001: Ubiquitous Com-puting, (Atlanta, Georgia, USA: Springer, 2001), 256–272.
Important Links:
Go Back