Card image Card image

Check out our
robot security research

Cyber security is a two-way street where both vendors and researchers must act responsibly. At Alias, we're committed to improve the robotics industry response times to security bugs and in an attempt to spread the word and inspire others to follow a similar path, we disclose part of our research.

PentestGPT: Evaluating and Harnessing Large Language Models for Automated Penetration Testing

A GPT-empowered penetration testing tool.

Start reading

SROS2: Usable Cyber Security Tools for ROS 2

Methodology and tools to secure ROS 2 computational graphs in a usable manner.

Start reading

Robot Cybersecurity, a review

We review the status of the robot cybersecurity after three years of research.

Start reading

Robot Teardown

We introduce and advocate for robot teardown as an approach to study robot hardware architectures and fuel security research.

Start reading

Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice

In cooperation with other researchers, this book stipulates the inclusion of security in robotics from the earliest design phases onward. We advocate for quantitative methods of security management, cover vulnerability scoring systems and account for the highly distributed nature of robots.

Start reading

Securing robots in OT enviroments

We show how simple attacks are feasible in OT and how an industrial cybersecurity solution is not capable of capturing the complexity of modern robot interactions. We extend one of such solutions with a robot-specific Endpoint Protection Platform (EPP) and successfully protect the robot from attacks.

Start reading

alurity, a toolbox for robot cybersecurity

We present a modular and composable toolbox for robot cybersecurity which ensures that both roboticists and security researchers working on a project have a common, consistent and easily reproducible development environment.

Start reading

Red teaming ROS in industry

Can ROS be used securely for industrial use cases? The present study analyzes this question experimentally by performing a targeted offensive security exercise in a synthetic industrial use case involving ROS-Industrial and ROS packages.

Start reading

DevSecOps in Robotics

We introduce DevSecOps in Robotics, a set of best practices designed to help roboticists implant security deep in the heart of their development and operations processes.

Start reading

Akerbeltz

Industrial robot ransomware. We present Akerbeltz, the first known instance of industrial robot ransomware. Our malware demonstrates the current insecurity landscape.

Start reading

Robot Vulnerability Database (RVD)

We present the Robot Vulnerability Database (RVD), a directory for responsible disclosure of bugs, weaknesses and vulnerabilities in robots.

Start reading

Aztarna

A footprinting tool for robots. We present aztarna and discuss how such tool can facilitate the process of identifying vestiges of different robots, while maintaining an extensible structure.

Start reading

Robot Hazards

We review robot hazards and analyze the consequences of not facing these issues. We advocate strongly for a security-first approach and argue about the transition from safety to security in robotics.

Start reading

Robot Security Framework (RSF)

A methodology to perform systematic security assessments in robots. We propose, adapt and develop specific terminology and provide guidelines to enable a holistic security assessment in robotics.

Start reading

Robotics CTF (RCTF)

A playground for robot hacking. We describe the architecture of the RCTF and provide 9 scenarios where hackers can challenge the security of different robotic setups.

Start reading

Robot Vulnerability Scoring System

We present a scoring system for robot vunerabilities that considers a) robot safety aspects, b) assessment of downstream implications, c) library and third-party scoring assessments and d) environmental variables.

Start reading