8th IFAC Symposium on Robot ControlĬerrudo, C., Apa, L.: Hacking robots before skynet. rep, Fraunhofer Institute for Secure Information Technology (SIT), Munich (2010)Ĭalcagno, R., Bonivento, A.: Wireless teach pendant for robotics technological rationale for comau witp. arXiv preprint arXiv:1504.04339īonev, I.: Should we fence the arms of universal robots? (2014)īrunner, M., Hofinger, H., Krauß, C., Roblee, C., Schoo, P., Todt, S.: Infiltrating critical infrastructures with next-generation attacks. (2014)īonaci, T., Herron, J., Yusuf, T., Yan, J., Kohno, T., Chizeck, H.J.: To make a robot secure: an experimental analysis of cyber security threats against teleoperated surgical robots (2015). (2017)īloem, J., Van Doorn, M., Duivestein, S., Excoffier, D., Maas, R., Van Ommeren, E.: The fourth industrial revolution-things to tighten the link between it and ot. In: 11th USENIX Workshop on Offensive Technologies (WOOT 17). (2017)īelikovetsky, S., Yampolskiy, M., Toh, J., Gatlin, J., Elovici, Y.: dr0wned-cyber-physical attack with additive manufacturing. (2016)Īpa, L.: Exploiting industrial collaborative robots.
Following up to our previous experimental analysis, we take a broad look at the deployment of industrial robots in a typical factory network and at the security challenges that arise from the interaction between operators and machines then, we propose actionable points to secure industrial cyber-physical systems, and we discuss the limitations of the current standards in industrial robotics to account for active attackers.ĪBB: Cyber Security Advisory, SI20107. In this paper, we take a holistic view of the security issues (and challenges) that arise in designing and securely deploying controlled manufacturing systems, using industrial robots as a case study-indeed, robots are the most representative instance of a complex automatically controlled industrial device.
Often, the devices employed are not designed for an interconnected world, but cannot be promptly replaced: In fact, they have essentially become legacy systems, embodying design patterns where components and networks are accounted as trusted elements. Despite the obvious advantages in terms of production and ease of maintenance, this trend raises non-trivial cybersecurity concerns. In modern factories, “controlled” manufacturing systems, such as industrial robots, CNC machines, or 3D printers, are often connected in a control network, together with a plethora of heterogeneous control devices.