Credential Masquerading and OpenSSL Spy: Exploring ROS 2 using DDS security

04/19/2019
by   Vincenzo DiLuoffo, et al.
0

The trend toward autonomous robot deployments is on an upward growth curve. These robots are undertaking new tasks and are being integrated into society. Examples of this trend are autonomous vehicles, humanoids, and eldercare. The movement from factory floors to streets and homes has also increased the number of vulnerabilities that adversaries can utilize. To improve security, Robot Operating System (ROS) 2 has standardized on using Data Distributed Services (DDS) as the messaging layer, which supports a security standard for protecting messages between parties with access control enforcement. DDS security is dependent on the OpenSSL and a security configuration file that specifies sensitive data location. DSS Security assumes that the underlining Operating System (OS) is secure and that the dependencies are consistent, but ongoing integrity checks are not performed. This paper looks at two vulnerabilities that we exploit using an OpenSSL spy process and a security property file manipulation. An overview of each exploit is provided with an evaluation of mitigation technologies that may be employed in client computers, servers, and other areas. Since, ROS 2 and DDS run in user space, these processes are prone to vulnerabilities. We provide recommendations about mitigation technology, as currently autonomous platforms are being deployed without safe-guards for on or off-line threats. The Trust Platform Module (TPM) is new to robotic systems, but the standard usage model does not provide risk mitigation above the OS layer for the types of attacks we discuss.

READ FULL TEXT

page 1

page 5

page 7

research
03/24/2021

A New Paradigm of Threats in Robotics Behaviors

Robots applications in our daily life increase at an unprecedented pace....
research
03/09/2020

Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment

With the evolution of computer systems, the amount of sensitive data to ...
research
12/22/2022

Detecting Network Security Vulnerabilities and Proactive Strategies to Mitigate Potential Threats

In multi-tier network systems, custom applications, Web services and pla...
research
03/12/2020

Securing Autonomous Service Robots through Fuzzing, Detection, and Mitigation

Autonomous service robots share social spaces with humans, usually worki...
research
04/12/2018

MPSM: Multi-prospective PaaS Security Model

Cloud computing has brought a revolution in the field of information tec...
research
04/26/2022

The Security War in File Systems: An Empirical Study from A Vulnerability-Centric Perspective

This paper presents a systematic study on the security of modern file sy...
research
10/28/2014

A First Look at Firefox OS Security

With Firefox OS, Mozilla is making a serious push for an HTML5-based mob...

Please sign up or login with your details

Forgot password? Click here to reset