CS4R: Cyber Security for Robotics

The robot cyber security for robotics workshop II

The second part of the afternoon will be focusing towards (some) solutions that provide security by looking into the responsibility of all those involved in the robotics value chain. When the end users don’t ask for cyber security, the manufacturers are not incentivized to build it in. When the system integrators forget about end to end security, and there is lack of understanding on the complexity and the requirements in providing cyber security solutions, researchers still continue to focus on various attack vectors and identify vulnerabilities that can be exploited.

During the debate, participants will be asked to qualify their main areas of interest and focus for solutions and will be driven towards the understanding of the need for an integrated approach.

Agenda

Opening

00:00-05:00

Endika Gil Uriarte, Ulrich Seldeslachts

Talk 1: Security in ROS & ROS 2 robot setups

35:00-45:00

Víctor Mayoral Vilches, ALIAS ROBOTICS

Mayoral will share some of the latest developments in securing ROS and ROS2. He’ll discuss how industrial robots require Zero Trust network architectures and will introduce RIS, (Robot Immune System) an EPP for Industrial robots that empowers this reality.

Slides | Video

Talk 2: Access control Models with application to robotics

60:00-75:00

Stefan Rass, ALPEN ANDRIA UNIVERSITY

Dr. Stefan Rass an expert in the security field will discuss why access control is critical in robotics. Rass will leverage on a comparative overview of the different methods in use, such as discretionary, mandatory, role-based, etc. and models like Bell-LaPadula. Do not miss this one! Sponsored by Alias robotics.

Slides | Video

Talk 3: Researchers, Manufacturers, Integrators, Security Technology providers, End Users and Operators

05:00-35:00

Ulrich Seldeslachts, LSEC-TRINITY

Shared roles & responsibilities, risk based approach (what to put in an RFP?) Industry Value chain definition Raising the awareness of cyber security in robotics, conclusions on CSFR19, Bilbao Cyber security by design, Vulnerabilities and Mitigation Strategies, Standardization & Responsible Disclosure

Slides | Video

Talk 4: Robot Security Survey results

85:00-Closing

Endika Gil Uriarte, ALIAS ROBOTICS

Endika will provide a wrap-up pointing at the very latest results on the Robot Security Survey poll that’s been open for a few months now. Gain more insights about how the robot security market is shaping up.

Slides | Video


Go to Part I

Speakers

Stefan Rass
Victor Mayoral Vilches
Ulrich Seldeslachts
Endika Gil Uriarte

COORDINATES

Where

Tech update session - Room 3
FYCMA - Palacio de Ferias y Congresos de Málaga
Av. de José Ortega y Gasset,
201, 29006 Málaga, Spain

When

March 3rd, 2020 - 15:30 CET

Would you like to learn more
about robot cyber security?

Our work   Let's talk

F.A.Q.

By threat modeling. Threat modeling helps you understand better your security flaws by studying the dataflows and the trust boundaries that apply to your use case/s. Once you have a clear picture of which attack vectors you're subject to, you'll be in position to decide on what to invest.

Traditional IT and recent OT network security are based on the castle-and-moat concept. In castle-and-moat security, it is hard to obtain access from outside the network, but everyone inside the network is trusted by default. The problem with this approach is that once an attacker gains access to the network, they have free reign over everything inside. This is what happens if you only use a VPN. VPNs offer a layer of protection but this is far from enough to guarantee security (specially when VPNs aren't flawless, e.g. see CVE-2019-14899)

Instead, we advocate for the use of Zero Trust security paradigm. Zero Trust security means that no one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network. Zero Trust moves network defenses from wide network perimeters to narrowly focusing on individual or small groups of resources. Access to data resources is granted when the resource is required, and authentication (both user and device) is performed before the connection is established.

Safety cares about the possible damage a robot may cause in its environment, whilst security aims at ensuring that the environment does not disturb the robot operation. Safety and security are connected matters.

There's no safety without security.

We encourage you to start caring about security at the design phase. Defining a proper architecture that takes security into account is key. Security can also be tackled at later phases but the more you delay it, the harder and more costly it'll be to ensure security.

In robotics there is a clear separation between Security and Quality that is best understood with scenarios involving robotic software components. For example, if one was building an industrial Autonomous Guided Vehicle (AGV) or a self-driving car, often, she/he would need to comply with coding standards (e.g. MISRA C for developing safety-critical systems). The same system's communications, however, regardless of its compliance with the coding standards, might rely on a channel that does not provide encryption or authentication and is thereby subject to eavesdropping and man-in-the-middle attacks. In this case neither security nor quality would be mutually exclusive, there will (and should) be elements of both.

Making security recommendations on robotic architectures demands proper understanding of such systems. Similarly, mitigating a vulnerability or a bug requires one to first reproduce the flaw. This can be extremely time consuming with robots, specially ensuring an appropiate enviroment for its analysis reproduction. Current robotic systems are of high complexity, a condition that in most cases leads to wide attack surfaces and a variety of potential attack vectors. This difficulties the mitigation process and the use of traditional security approaches. In-depth understanding of such systems (robots) is required and new mechanisms must be used.

Connected to the inherent complexity and time consumption is flaw prioritization. Patch management in robotics requires one to priorize first existing vulnerabilities. Existing scoring mechanisms such as CVSS have strong limitations when applied to robotics. Simply put, they fail to capture the interaction that robots may have with their environments and humans, leading to potential safety hazards. New scoring techniques in combination with knowhow is a must to maintain robotic systems secure.