On-site (either in your office or in ours) direct robot hacking. Relevant attacks are performed on the robot in order to confirm flaws including or erratic behavior.
This exercise produces a realistic output and allows Alias Robotics' engineers to provide a direct practical assessment of the robot insecurities.
This type of assessment is generally performed in a black-boxed manner where Alias doesn't have access to additional resources except what's publicly available.
Robot penetration testing allows you to get a realistic and practical input of how vulnerable your robot is within a scope. We challenge the security of your robots and exploit the identified vulnerabilities and weaknesses.
(for each flaw)
(required for mitigation)
(e.g. RVSS or CVSS)
This attack case study presents the penetration testing exercise conducted during the Week of Universal Robots’ Bugs. Our team challenged the security of these robots and developed exploits for identified vulnerabilities, across different firmware versions.
This study case presents the result of research and a posterior penetration testing exercise conducted on Softbank Robotics humanoid social robots. Building on top of past work, our team studied the security of these robots, and demonstrated the current insecurities.
In cooperation with KUKA, the german Federal Cyber Security Authority (BSI) or the Spanish National Cybersecurity Institute (INCIBE) among others, we pentest KUKA's robots and responsibly disclose results hinting that further work is required to protect against hazards.