Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis
IEEE Transactions on Computers
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Low Cost Attacks on Tamper Resistant Devices
Proceedings of the 5th International Workshop on Security Protocols
Securing the AES Finalists Against Power Analysis Attacks
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Differential Power Analysis in the Presence of Hardware Countermeasures
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
Electromagnetic Analysis: Concrete Results
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
Optical Fault Induction Attacks
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
IEEE Transactions on Computers
Improving Smart Card Security Using Self-Timed Circuits
ASYNC '02 Proceedings of the 8th International Symposium on Asynchronus Circuits and Systems
Optical Time-Domain Eavesdropping Risks of CRT Displays
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
WHICH CONCURRENT ERROR DETECTION SCHEME TO CHOOSE?
ITC '00 Proceedings of the 2000 IEEE International Test Conference
DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
IEEE Security and Privacy
Keyboard acoustic emanations revisited
Proceedings of the 12th ACM conference on Computer and communications security
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
DFT '07 Proceedings of the 22nd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems
Sequential Circuit Design for Embedded Cryptographic Applications Resilient to Adversarial Faults
IEEE Transactions on Computers
Double-Data-Rate Computation as a Countermeasure against Fault Analysis
IEEE Transactions on Computers
FDTC '08 Proceedings of the 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography
Inside risks: Reducing risks of implantable medical devices
Communications of the ACM - One Laptop Per Child: Vision vs. Reality
Survey on Security Challenges for Swarm Robotics
ICAS '09 Proceedings of the 2009 Fifth International Conference on Autonomic and Autonomous Systems
A spotlight on security and privacy risks with future household robots: attacks and lessons
Proceedings of the 11th international conference on Ubiquitous computing
Non-linear Error Detection for Finite State Machines
Information Security Applications
On the importance of checking cryptographic protocols for faults
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Fault attack resistant cryptographic hardware with uniform error detection
FDTC'06 Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography
Robust finite field arithmetic for fault-tolerant public-key cryptography
FDTC'06 Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography
Electromagnetic eavesdropping risks of flat-panel displays
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Security limits for compromising emanations
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Detecting trapdoors in smart cards using timing and power analysis
TestCom'05 Proceedings of the 17th IFIP TC6/WG 6.1 international conference on Testing of Communicating Systems
New class of nonlinear systematic error detecting codes
IEEE Transactions on Information Theory
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Hi-index | 0.00 |
In this work, we study the emerging security threats in a quickly proliferating field: robotics. The next generation robots embody most of the networking and computing components we normally use for everyday computing. Thus, the next generation robots virtually inherit all of the security weaknesses we are struggling with today. To make things worse, vulnerabilities in robots are much more significant, as they physically interact with their surroundings which include human beings. In this paper, we first provide a classification of potential physical attacks on robots. In addition, we outline a concrete active attack and propose a countermeasure.