Can You Still See Me?: Reconstructing Robot Operations Over End-to-End
Encrypted Channels
- URL: http://arxiv.org/abs/2205.08426v1
- Date: Tue, 17 May 2022 15:01:32 GMT
- Title: Can You Still See Me?: Reconstructing Robot Operations Over End-to-End
Encrypted Channels
- Authors: Ryan Shah, Chuadhry Mujeeb Ahmed, Shishir Nagaraja
- Abstract summary: Connected robots play a key role in Industry 4.0, providing automation and higher efficiency for many industrial.
Unfortunately, these robots can leak sensitive information regarding these operational to remote adversaries.
It is entirely possible for passive adversaries to fingerprint and reconstruct entire being carried out -- establishing an understanding of how facilities operate.
- Score: 5.847084649531299
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Connected robots play a key role in Industry 4.0, providing automation and
higher efficiency for many industrial workflows. Unfortunately, these robots
can leak sensitive information regarding these operational workflows to remote
adversaries. While there exists mandates for the use of end-to-end encryption
for data transmission in such settings, it is entirely possible for passive
adversaries to fingerprint and reconstruct entire workflows being carried out
-- establishing an understanding of how facilities operate. In this paper, we
investigate whether a remote attacker can accurately fingerprint robot
movements and ultimately reconstruct operational workflows. Using a neural
network approach to traffic analysis, we find that one can predict
TLS-encrypted movements with around \textasciitilde60\% accuracy, increasing to
near-perfect accuracy under realistic network conditions. Further, we also find
that attackers can reconstruct warehousing workflows with similar success.
Ultimately, simply adopting best cybersecurity practices is clearly not enough
to stop even weak (passive) adversaries.
Related papers
- Flow as the Cross-Domain Manipulation Interface [73.15952395641136]
Im2Flow2Act enables robots to acquire real-world manipulation skills without the need of real-world robot training data.
Im2Flow2Act comprises two components: a flow generation network and a flow-conditioned policy.
We demonstrate Im2Flow2Act's capabilities in a variety of real-world tasks, including the manipulation of rigid, articulated, and deformable objects.
arXiv Detail & Related papers (2024-07-21T16:15:02Z) - Cross-Embodiment Robot Manipulation Skill Transfer using Latent Space Alignment [24.93621734941354]
This paper focuses on transferring control policies between robot manipulators with different morphology.
Key insight is to project the state and action spaces of the source and target robots to a common latent space representation.
We demonstrate sim-to-sim and sim-to-real manipulation policy transfer with source and target robots of different states, actions, and embodiments.
arXiv Detail & Related papers (2024-06-04T05:00:24Z) - Track2Act: Predicting Point Tracks from Internet Videos enables Generalizable Robot Manipulation [65.46610405509338]
We seek to learn a generalizable goal-conditioned policy that enables zero-shot robot manipulation.
Our framework,Track2Act predicts tracks of how points in an image should move in future time-steps based on a goal.
We show that this approach of combining scalably learned track prediction with a residual policy enables diverse generalizable robot manipulation.
arXiv Detail & Related papers (2024-05-02T17:56:55Z) - LPAC: Learnable Perception-Action-Communication Loops with Applications
to Coverage Control [80.86089324742024]
We propose a learnable Perception-Action-Communication (LPAC) architecture for the problem.
CNN processes localized perception; a graph neural network (GNN) facilitates robot communications.
Evaluations show that the LPAC models outperform standard decentralized and centralized coverage control algorithms.
arXiv Detail & Related papers (2024-01-10T00:08:00Z) - On the Feasibility of Fingerprinting Collaborative Robot Traffic [13.676158049194873]
This study examines privacy risks in robotics collaborative, focusing on the potential for traffic analysis in encrypted robot communications.
We introduce a traffic classification approach using signal processing techniques, demonstrating high accuracy in action identification.
Our findings emphasize the need for continued development of practical defenses in robotic privacy and security.
arXiv Detail & Related papers (2023-12-11T19:26:30Z) - Towards a Near-real-time Protocol Tunneling Detector based on Machine Learning Techniques [0.0]
We present a protocol tunneling detector prototype which inspects, in near real time, a company's network traffic using machine learning techniques.
The detector monitors unencrypted network flows and extracts features to detect possible occurring attacks and anomalies.
Results show 97.1% overall accuracy and an F1-score equals to 95.6%.
arXiv Detail & Related papers (2023-09-22T09:08:43Z) - Robot Learning with Sensorimotor Pre-training [98.7755895548928]
We present a self-supervised sensorimotor pre-training approach for robotics.
Our model, called RPT, is a Transformer that operates on sequences of sensorimotor tokens.
We find that sensorimotor pre-training consistently outperforms training from scratch, has favorable scaling properties, and enables transfer across different tasks, environments, and robots.
arXiv Detail & Related papers (2023-06-16T17:58:10Z) - Reconstructing Robot Operations via Radio-Frequency Side-Channel [1.0742675209112622]
In recent years, a variety of attacks have been proposed that actively target the robot itself from the cyber domain.
In this work, we investigate whether an insider adversary can accurately fingerprint robot movements and operational warehousing via the radio frequency side channel.
arXiv Detail & Related papers (2022-09-21T08:14:51Z) - Revisiting the Adversarial Robustness-Accuracy Tradeoff in Robot
Learning [121.9708998627352]
Recent work has shown that, in practical robot learning applications, the effects of adversarial training do not pose a fair trade-off.
This work revisits the robustness-accuracy trade-off in robot learning by analyzing if recent advances in robust training methods and theory can make adversarial training suitable for real-world robot applications.
arXiv Detail & Related papers (2022-04-15T08:12:15Z) - Task-relevant Representation Learning for Networked Robotic Perception [74.0215744125845]
This paper presents an algorithm to learn task-relevant representations of sensory data that are co-designed with a pre-trained robotic perception model's ultimate objective.
Our algorithm aggressively compresses robotic sensory data by up to 11x more than competing methods.
arXiv Detail & Related papers (2020-11-06T07:39:08Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.