Robot Safety
At Home with Ubiquitous Computing: Seven Challenges
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
DIS '04 Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques
Common metrics for human-robot interaction
Proceedings of the 1st ACM SIGCHI/SIGART conference on Human-robot interaction
Stanley: The robot that won the DARPA Grand Challenge: Research Articles
Journal of Robotic Systems - Special Issue on the DARPA Grand Challenge, Part 2
How robotic products become social products: an ethnographic study of cleaning in the home
Proceedings of the ACM/IEEE international conference on Human-robot interaction
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Governing lethal behavior: embedding ethics in a hybrid deliberative/reactive robot architecture
Proceedings of the 3rd ACM/IEEE international conference on Human robot interaction
Asimov’s “three laws of robotics” and machine metaethics
AI & Society - Special Issue: Ethics and artificial agents
Odin: Team VictorTango's entry in the DARPA Urban Challenge
Journal of Field Robotics - Special Issue on the 2007 DARPA Urban Challenge, Part I
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Proceedings of the 5th annual conference on Information security curriculum development
"My Roomba is Rambo": intimate home appliances
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Development of the Tactile Sensor System of a Human-Interactive Robot “RI-MAN”
IEEE Transactions on Robotics
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Proceedings of the 42nd ACM technical symposium on Computer science education
Understanding users' perception of privacy in human-robot interaction
Proceedings of the 6th international conference on Human-robot interaction
Artificial Intelligence
Building secure robot applications
HotSec'11 Proceedings of the 6th USENIX conference on Hot topics in security
An emerging threat: eve meets a robot
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Privacy context model for dynamic privacy adaptation in ubiquitous computing
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Using an autonomous robot to maintain privacy in assistive environments
Security and Communication Networks
Computer security and the modern home
Communications of the ACM
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Lightweight secure communication protocols for in-vehicle sensor networks
Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles
Hi-index | 0.02 |
Future homes will be populated with large numbers of robots with diverse functionalities, ranging from chore robots to elder care robots to entertainment robots. While household robots will offer numerous benefits, they also have the potential to introduce new security and privacy vulnerabilities into the home. Our research consists of three parts. First, to serve as a foundation for our study, we experimentally analyze three of today's household robots for security and privacy vulnerabilities: the WowWee Rovio, the Erector Spykee, and the WowWee RoboSapien V2. Second, we synthesize the results of our experimental analyses and identify key lessons and challenges for securing future household robots. Finally, we use our experiments and lessons learned to construct a set of design questions aimed at facilitating the future development of household robots that are secure and preserve their users' privacy.