Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas...
Transcript of Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas...
![Page 1: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/1.jpg)
Domestic Robotsa case study on security in ubiquitous computing
Thomas KnellUbiquitous Computing Seminar15.4.2014
![Page 2: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/2.jpg)
! Any automatically operated machine that replaces human effort, though it may not resemble human beings in appearance or perform functions in a humanlike manner. – Encyclopaedia Britannica
! A robot is a cyber-physical system with sensors, actuators and mobility. – A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons, T. Denning et al.
! I can't define a robot, but I know one when I see one. – Joseph Engelberger (pioneer in industrial robotics)
Defining Robot
There exists no universally accepted definition of a robot
2
![Page 3: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/3.jpg)
Example 1: Cleaning Robots
Roomba MyWindoro
3
![Page 4: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/4.jpg)
Example 2: PR2
PR2 is a robotics research and development platform that lets you innovate right out of the box. No more building hardware and software from scratch. http://www.willowgarage.com/pages/pr2/overview
4
![Page 5: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/5.jpg)
Example 3: Atlas
Atlas is a high mobility, humanoid robot designed to operate outdoors, even on extremely rough terrain. http://www.bostondynamics.com/robot_Atlas.html
5
![Page 6: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/6.jpg)
Perception of Robots
! Survey from 2007! 240 Participants
What do people expect from robots?, C. Ray et al.6
![Page 7: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/7.jpg)
Stakeholder expectations
! New appliance: The household robot
! Users may have:− Incorrect preconceptions− No point of reference to understand the robot
! Designers will have to either:− Create very intuitive products, or− Integrate training course
A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons, T. Denning et al.7
![Page 8: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/8.jpg)
What is Security?
! Security:− Systems behave as intended
even in the presence of an adversary
! Safety:− Systems behave as intended
even in the presence of accidental failures
8
![Page 9: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/9.jpg)
Network Security Goals
! Confidentiality− Encryption
! Integrity− MAC, Digital Signature
! Availability− Redundancy, more Bandwidth
And More:! Authentication! Accountability! Non-repudiation! Privacy
Network Security, Bernhard Plattner9
![Page 10: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/10.jpg)
Secure Communication Channel
! Confidential channel− No eavesdropping possible on information sent
! Authentic channel − Sender is the one he claims to be and− Content is original
! Secure channel− Authentic and confidential channel
Network Security, Bernhard Plattner10
![Page 11: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/11.jpg)
Attack Classification
Passive attacks
Confidentiality
Traffic analysisCompromiseof content
Active attacks
Availability Integrity andAuthenticity
Denial ofservice
Modification
Fabrication
Replay
Classification due to Steve Kent, BBN Technologies11
![Page 12: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/12.jpg)
Timeline: Computers
The Future of Household Robots, T. Denning
1951UNIVAC
1946ENIAC
1944Colossus
12
![Page 13: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/13.jpg)
Timeline: Computers
The Future of Household Robots, T. Denning
1974Altair 8800
1977Apple II
1981IBM PC
1982Commodore 64
1984Apple Macintosh
13
![Page 14: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/14.jpg)
Timeline: Computers
The Future of Household Robots, T. Denning14
![Page 15: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/15.jpg)
Timeline: Computer Security Attacks
1960-1970Phone Phreaking
The Future of Household Robots, T. Denning15
![Page 16: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/16.jpg)
Timeline: Computer Security Attacks
The Future of Household Robots, T. Denning
1980sThe 414s break into 60 Computer systems
16
![Page 17: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/17.jpg)
Timeline: Computer Security Attacks
1986“The Brain” Virus
The Future of Household Robots, T. Denning17
![Page 18: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/18.jpg)
Timeline: Computer Security Attacks
1988Morris Worm
The Future of Household Robots, T. Denning18
![Page 19: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/19.jpg)
Timeline: Computer Security Attacks
The Future of Household Robots, T. Denning
2000sDDoS Attacks
19
![Page 20: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/20.jpg)
Timeline: Computer Security Attacks
The Future of Household Robots, T. Denning20
! Rootkits! Trojan Horses! Botnets! Phishing! Keyloggers! Cross-Site Scripting! etc.
![Page 21: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/21.jpg)
Timeline: Computer Security Attacks
Observations:! The attack rate increases! The attacks lag behind the technology
The Future of Household Robots, T. Denning21
![Page 22: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/22.jpg)
Timeline: Robots
The Future of Household Robots, T. Denning
1979Robotics Institute founded at Carnegie Mellon University
22
![Page 23: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/23.jpg)
Timeline: Robots
The Future of Household Robots, T. Denning
1982WABOT-2 accompanies people on a keyboard instrument
23
![Page 24: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/24.jpg)
Timeline: Robots
The Future of Household Robots, T. Denning
1986Honda founds Humanoid Robot Division
24
![Page 25: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/25.jpg)
Timeline: Robots
The Future of Household Robots, T. Denning25
1999AIBO
![Page 26: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/26.jpg)
Timeline: Robots
The Future of Household Robots, T. Denning26
2000ASIMO
![Page 27: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/27.jpg)
Timeline: Robots
The Future of Household Robots, T. Denning27
2001Paro therapeutic seal
![Page 28: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/28.jpg)
Timeline: Robots
The Future of Household Robots, T. Denning
2002Roomba
28
![Page 29: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/29.jpg)
Timeline: Robots
The Future of Household Robots, T. Denning
2005Actroid Android
29
![Page 30: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/30.jpg)
Timeline: Robots
The Future of Household Robots, T. Denning
2008Okonomiyaki Robot
30
![Page 31: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/31.jpg)
Timeline: Robots
Observations:! No large-scale attacks on robot security yet
Recall (computer security):! The attack rate increases! The attacks lag behind the technology
The Future of Household Robots, T. Denning31
![Page 32: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/32.jpg)
A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons
32
![Page 33: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/33.jpg)
Rovio
! For adults! Telepresence! Home surveillance! Check up on relatives! Follows pre-programmed
IR beacons! Controlled via web interface
33
![Page 34: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/34.jpg)
Spykee
! Toy for children! Assembled and configured
by children! Telepresence: Parent can
tuck in kids when out of town
! “Spy” robot! Controlled via program
34
![Page 35: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/35.jpg)
Discovered Vulnerabilities
35
![Page 36: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/36.jpg)
Remote Discovery
A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons, T. Denning et al.36
![Page 37: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/37.jpg)
Eavesdropping
Neighbor or Hacker in a car
A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons, T. Denning et al.37
![Page 38: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/38.jpg)
Intercepting Credentials (MITM)
A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons, T. Denning et al.
Can intercept login credentials
www.spykeeworld.com
38
![Page 39: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/39.jpg)
Physical Takeover
! With credentials: Drive the robot anywhere
! Access the AV stream at any time
39
![Page 40: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/40.jpg)
Possible Attacks
! Robot vandalism− Damage fragile object− Knock object off of a table− Damaging the robot itself (robot suicide)
! Manipulate Objects− Use mobility to locate (physical) key
− Take image of a key− Pick up and hide key
! Eldercare− Robot used to trip an elder− Play noises and speech to confuse elder
A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons, T. Denning et al.40
![Page 41: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/41.jpg)
Mechatronic Security and
Robot Authentication
41
![Page 42: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/42.jpg)
Robot as Living Individuals
! Born at some point− Has non-clonable DNA− Gets a birth certificate
! Starts usual transactions with its environment− Learning, developing its knowledge and capabilities
! Gets old− Has to be repaired, or− dies
Mechatronic Security and Robot Authentication, W. Adi42
![Page 43: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/43.jpg)
! Biological mutation− Permanent irremovable change
! Electronic mutation − Simulated change
! e-DNA− Generate e-DNA chain from e-Mutation
Bio-Inspired Robot Identity
Mechatronic Security and Robot Authentication, W. Adi43
![Page 44: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/44.jpg)
Detecting Cloning Attack
! Cloning almost impossible− Crack mutated identity− Copy all robot transactions history
! Detect Cloning Attack− Two G units with same properties− Each unit G generates new trace− G' and G'' most likely different− Both systems claim to be G �− Identification process will fail
Mechatronic Security and Robot Authentication, W. Adi44
![Page 45: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/45.jpg)
Mechatronic Security Goals
! Robot is provable witness of event
! Robot can prove having performed action
! Robot cannot falsly claim to have performed action
45
![Page 46: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/46.jpg)
Risks of Tomorrow
46
![Page 47: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/47.jpg)
Risks of Tomorrow
! Robots for elders− Exoskeleton for mobility− Lifting robot
47
![Page 48: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/48.jpg)
Risks of Tomorrow
! Robots for elders− Exoskeleton for mobility− Lifting robot
! Robots for children− As companions or as therapy
for unique emotional needs
48
![Page 49: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/49.jpg)
Risks of Tomorrow
! Robots for elders− Exoskeleton for mobility− Lifting robot
! Robots for children− As companions or as therapy
for unique emotional needs! Robots that use tools
49
![Page 50: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/50.jpg)
Risks of Tomorrow
! Robots for elders− Exoskeleton for mobility− Lifting robot
! Robots for children− As companions or as therapy
for unique emotional needs! Robots that use tools! Robots with sophisticated A.I.
50
![Page 51: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/51.jpg)
Are the Risks real?
Potential types of attackers! Terrorists! Competitor! Acquaintance! ID Thief! Prankster! Governments
51
![Page 52: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/52.jpg)
Conclusion
! Spykee and Rovio robots are “only” toys − Security not first priority− Vulnerabilities not specific to robots
Can be easily fixed
! Future robots more complex− Even developers don't understand reasons for behavior− Difficult to detect an enemy's attack− How to prevent the robot from leaking information?
! Young area of research− Lack of detailed studies− Difficult to predict technology
52
![Page 53: Domestic Robots - ETH Z · Domestic Robots a case study on security in ubiquitous computing Thomas Knell Ubiquitous Computing Seminar ... Altair 8800 1977 Apple II 1981 IBM PC 1982](https://reader033.fdocuments.us/reader033/viewer/2022042311/5ed98f831b54311e7967ca27/html5/thumbnails/53.jpg)
Questions?
53