Edition 2 | Exploring the Autonomous Systems
Gagan Bagh
Associate Consultant - CYRES | Automotive Security Researcher | TARA | CSMS | ISO/SAE 21434 | Robotics Cybersecurity
5 months ago, I posted by saying- Autonomous vehicle companies may or may not use it, but learning ROS is a smart move-you might be surprised in the future.
I was incorrect! Today, I say "Autonomous vehicle companies use it, learn it now".
Yes, it is a window into opportunities.
Robotics Hacking
Back in December 2022, I started to learn ROS1 with the goal of exploring Robotics Cybersecurity. The first thing I did was program an automated bash script and perform a replay attack on a simulation bot. Easy-peasy ;)
This is just an example of what another tests we will conduct during assessment of autonomous vehicles which are powered by Robot Operating Systems (ROS). They perceive environmental data, process it, make decisions, and then control the actuators to move autonomously. I won't go into detail because I'm just trying to hand you homework.
Now, without further ado, let's try to understand the different types of Autonomous Systems and their unique security challenges based on their working and use cases.
Open-World Autonomous Systems
This kind of autonomous vehicle operates in unpredictable environments, like autonomous cars navigating in real-world traffic with lot of unpredictable and unplanned scenarios. Their ability to adapt to dynamic conditions makes them super advanced but also vulnerable to cyber threats like spoofing, signal interference, and unexpected sensor manipulation.
Threat actors can find it hard to get into this systems(it all depends on level of security though) but once exploited, these can cause malfunction or even gain control over the autonomous systems.
Here’s few list of unique security challenges open-world autonomous systems may have:
Have a look at this post by Denis Laskov , a perfect example of physical obstacles.
领英推荐
Closed-World Systems
On the other hand, functions within pre-defined, controlled environments, such as autonomous shuttles in the parks, airport, industrial areas or automated manufacturing robots on a factory floor. Their map and path is not going to change dynamically. They know their decision very precisely like when to slow down, turn, and so on. While they might seem more secure to you, they’re not actually immune to security risks like insider threats, malware attacks, or unauthorized access. A breach can lead to significant disruptions of functions and potential safety hazards.
Closed-world systems can sometimes appear to be more secure due to their controlled environments. However, the implemented security can create vulnerabilities if not addressed properly.
Here is a list of unique security challenges, closed-world systems may have:
Both autonomous systems rely on sensors, like cameras LiDAR, and communication modules, the number of components increases the attack surface. Attackers can target anything from LIDAR sensors to wireless communication modules, making it easier to find weak points.
Coming to ROS, It can be found in both open-world and closed-world autonomous vehicles, but the architectural factors often make it more easily accessible, and potentially more vulnerable, in closed-world systems.
In many closed-world autonomous vehicles or robots, physical access to the hardware running ROS is often easier. Threat actor can physically connect to the network, attach malicious devices, or tamper with nodes directly.
However, in open-world systems like autonomous cars, physical access is harder to achieve, requiring more sophisticated remote attacks including multiple expertise to get into ROS network.
END
Alright, that's all I had planned for you all. Thanks for sticking with me until the end of this edition; until next time, bye! Happy learning and stay ahead of the game of cybersecurity.
Yours in Cybersecurity
Gagan (Sourav)
PS: While I start writing the next edition, spread the word about "Security Pulse" by sharing it with your connections and friends.