ROSploit: Cybersecurity Tool for ROS
Title | ROSploit: Cybersecurity Tool for ROS |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Rivera, S., Lagraa, S., State, R. |
Conference Name | 2019 Third IEEE International Conference on Robotic Computing (IRC) |
Date Published | Feb. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-5386-9245-5 |
Keywords | Analytical models, Biological system modeling, control engineering computing, cybersecurity, cybersecurity tool, foundational knowledge, Human Behavior, human factors, modular two-pronged offensive tool, offensive tool, Operating systems, operating systems (computers), policy-based governance, preliminary state, pubcrawl, public domain software, Reconnaissance, resilience, Resiliency, robot operating systems, robot programming, robotic operating system security research, robotic systems, Robotics, robots, ROS, ROS systems, ROSploit, security, security of data, security vulnerabilities, threat model, Tools |
Abstract | Robotic Operating System(ROS) security research is currently in a preliminary state, with limited research in tools or models. Considering the trend of digitization of robotic systems, this lack of foundational knowledge increases the potential threat posed by security vulnerabilities in ROS. In this article, we present a new tool to assist further security research in ROS, ROSploit. ROSploit is a modular two-pronged offensive tool covering both reconnaissance and exploitation of ROS systems, designed to assist researchers in testing exploits for ROS. |
URL | https://ieeexplore.ieee.org/document/8675686 |
DOI | 10.1109/IRC.2019.00077 |
Citation Key | rivera_rosploit_2019 |
- ROS
- resilience
- Resiliency
- robot operating systems
- robot programming
- robotic operating system security research
- robotic systems
- robotics
- robots
- Reconnaissance
- ROS systems
- ROSploit
- security
- security of data
- security vulnerabilities
- threat model
- tools
- Analytical models
- public domain software
- pubcrawl
- preliminary state
- policy-based governance
- operating systems (computers)
- operating systems
- offensive tool
- modular two-pronged offensive tool
- Human Factors
- Human behavior
- foundational knowledge
- cybersecurity tool
- Cybersecurity
- control engineering computing
- Biological system modeling