The Future of Household Robots: Ensuring the Safety and Privacy of - - PowerPoint PPT Presentation

the future of household robots
SMART_READER_LITE
LIVE PREVIEW

The Future of Household Robots: Ensuring the Safety and Privacy of - - PowerPoint PPT Presentation

The Future of Household Robots: Ensuring the Safety and Privacy of Users T a m a r a D e n n i n g C y n t h i a M a t u s z e k K a r l K o s c h e r J o s h u a R . S m i t h T a d a y o s h i K o h n o C o m p u t e r S c i e n c e


slide-1
SLIDE 1

T a m a r a D e n n i n g C y n t h i a M a t u s z e k K a r l K o s c h e r J o s h u a R . S m i t h T a d a y o s h i K o h n o C o m p u t e r S c i e n c e a n d E n g i n e e r i n g U n i v e r s i t y o f W a s h i n g t o n

The Future of Household Robots:

Ensuring the Safety and Privacy of Users

slide-2
SLIDE 2

Focus of This Talk: Robots, Security, and Privacy

 This talk is about two things:

 The future of robots in the home  Computer security and privacy

 To make sure we‟re all on the same page, first:

 Brief background on robots  Brief background on security and privacy

11/24/2009

2

slide-3
SLIDE 3

What is a Robot?

 Cyber-physical system with:

 Mobility  Sensors  Actuators  Some reasoning capabilities (potentially)

11/24/2009

3

CC images courtesy of: http://www.flickr.com/photos/bbum/133956572/, http://www.flickr.com/photos/deadair/220147470/, http://www.flickr.com/photos/cmpalmer/3380364862/

slide-4
SLIDE 4

What is a Robot?

 Cyber-physical system with:

 Mobility  Sensors  Actuators  Some reasoning capabilities (potentially)

 Applications:

 Elder care  Physically-enabled smart home

11/24/2009

4

slide-5
SLIDE 5

What is Security?

 Security:

 Systems behave as intended even in the presence of an

adversary

11/24/2009

5

slide-6
SLIDE 6

What is Security?

 Security:

 Systems behave as intended even in the presence of an

adversary

 NOT Safety:

 Systems behave as intended even in the presence of accidental

failures

11/24/2009

6

slide-7
SLIDE 7

Security for Robots?

 To understand the importance of security for robots,

we give context: A brief history of computers and computer security.

11/24/2009

7

slide-8
SLIDE 8

Timeline: Computers

11/24/2009

8

1940 2000 1970

slide-9
SLIDE 9

Timeline: Computers

11/24/2009

9

1940 2000 1970 1946 ENIAC 1951 UNIVAC 1944 Colossus

slide-10
SLIDE 10

Timeline: Computers

11/24/2009

10

1940 2000 1970 1977 Apple II 1981 IBM Personal Computer 1982 Commodore 64 1984 Apple Macintosh 1974 Altair 8800

slide-11
SLIDE 11

Timeline: Computers

11/24/2009

11

1990 World Wide Web 1940 2000 1970

slide-12
SLIDE 12

Timeline: Computers

11/24/2009

12

1940 2000 1970 1994 Amazon 1995 Ebay 1998 Google 2004 Facebook 2005 YouTube 2006 Twitter

slide-13
SLIDE 13

Timeline: Computers

11/24/2009

13

1940 2000 1970

slide-14
SLIDE 14

Timeline: Computers

11/24/2009

14

1940 2000 1970

Now looking at computer security…

slide-15
SLIDE 15

Timeline: Computer Security Attacks

11/24/2009

15

1940 2000 1970 1971 Phone Phreaking

slide-16
SLIDE 16

Timeline: Computer Security Attacks

11/24/2009

16

1940 2000 1970 1982 The 414s break into 60 computer systems

slide-17
SLIDE 17

Timeline: Computer Security Attacks

11/24/2009

17

1940 2000 1970 1986 “The Brain” Virus

slide-18
SLIDE 18

Timeline: Computer Security Attacks

11/24/2009

18

1940 2000 1970 1988 Morris Worm

slide-19
SLIDE 19

Timeline: Computer Security Attacks

11/24/2009

19

1940 2000 1970 2000 DDoS Attack

slide-20
SLIDE 20

Timeline: Computer Security Attacks

11/24/2009

20

1940 2000 1970

  • Rootkits
slide-21
SLIDE 21

Timeline: Computer Security Attacks

11/24/2009

21

1940 2000 1970

  • Rootkits
  • Trojan Horses
slide-22
SLIDE 22

Timeline: Computer Security Attacks

11/24/2009

22

1940 2000 1970

  • Rootkits
  • Trojan Horses
  • Botnets
slide-23
SLIDE 23

Timeline: Computer Security Attacks

11/24/2009

23

1940 2000 1970

  • Rootkits
  • Trojan Horses
  • Botnets
  • Phishing
slide-24
SLIDE 24

Timeline: Computer Security Attacks

11/24/2009

24

1940 2000 1970

  • Rootkits
  • Trojan Horses
  • Botnets
  • Phishing
  • Keyloggers
slide-25
SLIDE 25

Timeline: Computer Security Attacks

11/24/2009

25

1940 2000 1970

  • Rootkits
  • Trojan Horses
  • Botnets
  • Phishing
  • Keyloggers
  • Cross-Site Scripting
slide-26
SLIDE 26

Timeline: Computer Security Attacks

11/24/2009

26

1940 2000 1970

  • Rootkits
  • Trojan Horses
  • Botnets
  • Phishing
  • Keyloggers
  • Cross-Site Scripting
  • etc.
slide-27
SLIDE 27

Timeline: Computer Security Attacks

11/24/2009

27

1940 2000 1970

Observations:

  • The attack rate increases
  • The attacks lag behind the technology
slide-28
SLIDE 28

Timeline: Robots

11/24/2009

28

1979 Robotics Institute founded at Carnegie Mellon University 1960 2000 2020

slide-29
SLIDE 29

Timeline: Robots

11/24/2009

29

1982 WABOT-2 accompanies people on a keyboard instrument 1960 2000 2020

slide-30
SLIDE 30

Timeline: Robots

11/24/2009

30

1986 Honda founds Humanoid Robot Division 1960 2000 2020

slide-31
SLIDE 31

Timeline: Robots

11/24/2009

31

1999 AIBO 1960 2000 2020

slide-32
SLIDE 32

Timeline: Robots

11/24/2009

32

2000 ASIMO 1960 2000 2020

slide-33
SLIDE 33

Timeline: Robots

11/24/2009

33

2001 Paro therapeutic seal 1960 2000 2020

slide-34
SLIDE 34

Timeline: Robots

11/24/2009

34

2002 Roomba 1960 2000 2020

slide-35
SLIDE 35

Timeline: Robots

11/24/2009

35

1960 2000 2020 2005 Actroid Android 2005 Wakamaru Companion Robot

slide-36
SLIDE 36

Timeline: Robots

11/24/2009

36

1960 2000 2020 2008 Okonomiyaki Robot

slide-37
SLIDE 37

Timeline: Robots

11/24/2009

37

1960 2000 2020 2010 ? HAL exoskeleton

slide-38
SLIDE 38

Timeline: Robots

11/24/2009

38

1960 2000 2020

slide-39
SLIDE 39

Timeline: Robot Security

11/24/2009

39

1960 2000 2020

Observation:

  • No attacks on robot security yet

Recall (computer security):

  • The attack rate increases
  • The attacks lag behind the technology

What is the future of robot security?

slide-40
SLIDE 40

Robot Security and Privacy in Context

 Our focus: Robot security and privacy

 Evil people doing bad things with robots  Most likely near term security and privacy

threat

11/24/2009

40

slide-41
SLIDE 41

Robot Security and Privacy in Context

 Our focus: Robot security and privacy

 Evil people doing bad things with robots  Most likely near term security and privacy

threat

 Evil robots

 Popular topic of science fiction  Unlikely near term security and privacy

threat

 Other challenges to mixing humans

with robots

 Safety  Human-robot interaction

11/24/2009

41

slide-42
SLIDE 42

Talk Outline

Part 1. Introduction Part 2. Assessing the Risks: Today and Tomorrow Part 3. Challenges and Next Steps

11/24/2009

42

slide-43
SLIDE 43

Understanding Current and Future Risks: The Computer Security Approach

Identify representative examples of future tech

Assess the security and privacy vulnerabilities of those examples

Determine risks for today and extrapolate risks for tomorrow

11/24/2009

43

slide-44
SLIDE 44

There are many household robots for sale…

11/24/2009

44

Roomba (vacuum) Scooba (mop) Robomow (lawn mower) Pleo (artificial lifeform toy) Lego Mindstorm NXT (toy and learning kit) FlyTech Bladestar (flying toy)

 How to pick which robots to study?

slide-45
SLIDE 45

Axes for Selecting Representatives Robots

 Strategy: Pick robots that span likely properties of

future robots

 Different Groups of Intended Users  Mobility  Actuators  Sensors  Communication Methods

11/24/2009

45

slide-46
SLIDE 46

Our Selection: Spanning the Axes

11/24/2009

46

RoboSapien V2 Rovio Spykee

Robots purchased for experimentation during or before October 2008.

slide-47
SLIDE 47

RoboSapien V2

11/24/2009

47

  • Toy for children and hobbyists
  • Mobile, bipedal
  • Basic Dexterity
  • Controlled by IR remote
  • Some autonomous behavior
  • Pre-programmed speech
slide-48
SLIDE 48

Rovio

11/24/2009

48

  • For adults
  • Telepresence
  • Home surveillance
  • Check up up on relatives
  • Follows pre-programmed

IR beacons

slide-49
SLIDE 49

Spykee

11/24/2009

49

  • Toy for children
  • Assembled and

configured by children

  • Telepresence: Parent

can tuck in kids when

  • ut of town
  • “Spy” robot
slide-50
SLIDE 50

So, what vulnerabilities did we find?

11/24/2009

50

slide-51
SLIDE 51

So, what vulnerabilities did we find?

11/24/2009

51

Focusing on Spykee and Rovio for now (we‟ll come back to RoboSapien V2 later)

slide-52
SLIDE 52

Remote Discovery

11/24/2009

52

(Artificial data -- not real locations of robots)

slide-53
SLIDE 53

Eavesdropping (shown in ad hoc mode)

11/24/2009

53

Neighbor or Hacker in a car

CC images courtesy of: http://www.flickr.com/photos/wwworks/3039389897/, http://www.flickr.com/photos/jamimages/83601411/

slide-54
SLIDE 54

Intercepting Credentials (Remote Mode)

11/24/2009

54

http://spykeeworld.com

09867028 934149871 358357619 035602844 09867028 934149871 358357619 035602844 254757324 523476784 561436546 456436345 User: alice1 Password: pass1

slide-55
SLIDE 55

Physical Takeover

 With credentials: Drive the robot anywhere  Access the AV stream at any time

11/24/2009

55

slide-56
SLIDE 56

What the vulnerabilities mean to people…

 We discussed some vulnerabilities…  What do these vulnerabilities mean to people and

their environment?

11/24/2009

56

slide-57
SLIDE 57

What the vulnerabilities mean to people…

 We discussed some vulnerabilities…  What do these vulnerabilities mean to people and

their environment?

 (We did not implement these attacks.)

11/24/2009

57

Many risks today are minor. We explore attack scenarios because they illustrate potential future risks with household robots.

slide-58
SLIDE 58

Rovio: Spy on Home

 Spy/eavesdrop in the home

11/24/2009

58

Many risks today are minor. We explore attack scenarios because they illustrate potential future risks with household robots.

CC image courtesy of: http://www.flickr.com/photos/3mieszczanka/3253181023/

slide-59
SLIDE 59

 Spy/eavesdrop in the home

Rovio: Spy on Home

11/24/2009

59

Many risks today are minor. We explore attack scenarios because they illustrate potential future risks with household robots.

CC image courtesy of: http://www.flickr.com/photos/arthurohm/1977354073/

slide-60
SLIDE 60

Rovio: Spy on Home

 Spy/eavesdrop in the home

11/24/2009

60

Many risks today are minor. We explore attack scenarios because they illustrate potential future risks with household robots.

CC image courtesy of: http://www.flickr.com/photos/paladin27/2277420652/

slide-61
SLIDE 61

Rovio: Spy on Home

 Spy/eavesdrop in the home

11/24/2009

61

Many risks today are minor. We explore attack scenarios because they illustrate potential future risks with household robots.

CC image courtesy of: http://www.flickr.com/photos/affixations/2542167108/

slide-62
SLIDE 62

Rovio: Move Around the Home

 Move around rooms of the house to facilitate spying

and eavesdropping

11/24/2009

62

Many risks today are minor. We explore attack scenarios because they illustrate potential future risks with household robots.

slide-63
SLIDE 63

Rovio: Property Damage

 Use weight to cause minor property damage

11/24/2009

63

Many risks today are minor. We explore attack scenarios because they illustrate potential future risks with household robots.

CC image courtesy of: http://www.flickr.com/photos/kacey3/2002598626/

slide-64
SLIDE 64

Rovio: Create Hazards

 E.g., Bowl of grapes near an infant

11/24/2009

64

Many risks today are minor. We explore attack scenarios because they illustrate potential future risks with household robots.

CC image courtesy of: http://www.flickr.com/photos/mindfire/3256681195/

slide-65
SLIDE 65

Rovio: Trip People

 Drive underneath elder‟s feet to trip them

11/24/2009

65

Many risks today are minor. We explore attack scenarios because they illustrate potential future risks with household robots.

CC image courtesy of: http://www.flickr.com/photos/marktristan/2733951264/

slide-66
SLIDE 66

Rovio: People with Dementia

 Make sounds to confuse people with dementia  Displace objects to confuse people with dementia

11/24/2009

66

Many risks today are minor. We explore attack scenarios because they illustrate potential future risks with household robots.

slide-67
SLIDE 67

Rovio: Superstitious Symbols

 Create patterns on the floor to play on superstitions

11/24/2009

67

Many risks today are minor. We explore attack scenarios because they illustrate potential future risks with household robots.

slide-68
SLIDE 68

Rovio: The Risks

11/24/2009

68

 Spy on residents  Move between areas of the house to facilitate spying  Property damage  Robot suicide  Knock over objects around infants  Trip elderly relatives  Create superstitious symbols

slide-69
SLIDE 69

Spykee: The Risks

11/24/2009

69

 Same kinds of risks as the Rovio, but…

slide-70
SLIDE 70

Spykee: The Risks

11/24/2009

70

 Same kinds of risks as the Rovio, but…  Spykee meant to be:

 Built by children (Erector set, 8+ years)  Configured by children  Connected to the Internet by children

slide-71
SLIDE 71

Spykee: The Risks

11/24/2009

71

 Same kinds of risks as the Rovio, but…  Spykee meant to be:

 Built by children (Erector set, 8+ years)  Configured by children  Connected to the Internet by children

 And most of all…played with by children

slide-72
SLIDE 72

Spykee: The Risks

11/24/2009

72

 Same kinds of risks as the Rovio, but…  Spykee meant to be:

 Built by children  Configured by children  Connected to the Internet by children

 And most of all…played with by children

CC images courtesy of: http://www.flickr.com/photos/ooh_food/3510270149/, http://www.flickr.com/photos/aznongbri/945555443/

slide-73
SLIDE 73

The Risks Tomorrow

11/24/2009

73

We have not analyzed the robots shown. They may or may not have vulnerabilities and may or may not be used for attacks. We are using them as examples of future kinds of robots.

slide-74
SLIDE 74

The Risks Tomorrow

 Robots for elders

 Exoskeleton for mobility  Lifting robot

11/24/2009

74

We have not analyzed the robots shown. They may or may not have vulnerabilities and may or may not be used for attacks. We are using them as examples of future kinds of robots.

slide-75
SLIDE 75

The Risks Tomorrow

 Robots for elders

 Exoskeleton for mobility  Lifting robot

 Robots for children

 As companions or as therapy

for unique emotional needs

11/24/2009

75

We have not analyzed the robots shown. They may or may not have vulnerabilities and may or may not be used for attacks. We are using them as examples of future kinds of robots.

slide-76
SLIDE 76

The Risks Tomorrow

 Robots for elders

 Exoskeleton for mobility  Lifting robot

 Robots for children

 As companions or as therapy

for unique emotional needs

 Robots that use tools

11/24/2009

76

We have not analyzed the robots shown. They may or may not have vulnerabilities and may or may not be used for attacks. We are using them as examples of future kinds of robots.

slide-77
SLIDE 77

Are the risks real?

 Our focus is on the future, when household robots

might be ubiquitous and sophisticated

 Potential types of attackers

 Terrorist  Competitor  Acquaintance  ID Thief  Prankster

11/24/2009

77

slide-78
SLIDE 78

Computer Systems for Physical Harm

slide-79
SLIDE 79

November 2007

“It was just a bunch of very immature people delighting in their attempts to cause people misery”

slide-80
SLIDE 80

Again in March 2008

“This was clearly an act of vandalism with the intent to harm people”

slide-81
SLIDE 81

Talk Outline

Part 1. Introduction Part 2. Assessing the Risks: Today and Tomorrow Part 3. Challenges and Next Steps

11/24/2009

81

slide-82
SLIDE 82

There are many ways to raise the bar…

 Basic Steps (for the user)

 Encrypted home network  Don‟t use ad hoc  Don‟t connect robots to the Internet  Don‟t allow the robots in “private” spaces

 Basic Steps (for the manufacturers)

 Security evaluations  Use encryption (properly!)  Secure firmware updates

11/24/2009

82

slide-83
SLIDE 83

Standard Security Practices Are Not Sufficient

 Implementation vulnerabilities

 No such thing as perfect security  Vulnerabilities often found even in modern desktop computing

systems implementing best practices

 Secure networks can be cracked

 Usage vulnerabilities

 Users don‟t always secure networks  Users can misconfigure security settings even when employing

them

11/24/2009

83

slide-84
SLIDE 84

Robots Have Unique Properties

 Physicality

 Mobility  Dexterity

 Interactive and in the middle

  • f the home

 These lead to unique

challenges…

11/24/2009

84

CC image courtesy of: http://www.flickr.com/photos/eiriknewth/282273087/

slide-85
SLIDE 85

No Longer a Desktop Computer: New Challenges

11/24/2009

85

 Robots that connect to the Internet are not

traditional vacuum cleaners or toasters

 Children as administrators  Robot interface is minimal

slide-86
SLIDE 86

No Longer a Desktop Computer: New Challenges

 Heterogeneous environments

 Multiple direct and indirect users  Pets  Children  Elderly  Guests

 Meaning…

 The people affected by robot security vulnerabilities may not

be the robots‟ administrators

 May be difficult to notice a hijacked robot

11/24/2009

86

slide-87
SLIDE 87

No Longer a Desktop Computer: New Challenges

11/24/2009

87

 Even if you secure one robot in isolation…

slide-88
SLIDE 88

Multi-Robot

11/24/2009

88

 Even if you secure one robot in isolation…  What can two robots achieve?  Overcome each other‟s safeguards?  Combine physical capabilities?  Combine sensorial capabilities?  Manufacturers might not expect this!

slide-89
SLIDE 89

Our Setup

 Toy example

 Compromised Rovio (supplies camera)  IR/RF repeater positioned within line of sight of the

RoboSapien V2

 Remote for the RoboSapien V2

 What can we do?

11/24/2009

89

slide-90
SLIDE 90

Multi-Robot: Our Setup

Rovio RoboSapien V2 IR/RF Repeater Combined AV Feed Grippers Communication Out of Line of Sight

11/24/2009

90

slide-91
SLIDE 91

Multi-Robot Attack: Demo

11/24/2009

91

slide-92
SLIDE 92

Security and Privacy for Users of Future Household Robots

 A near term threat: evil people using robots

 Needs attention today before technology matures

 Identified security and privacy vulnerabilities in

today‟s robots. Implications:

 For today: Mild to moderate risks  For future: More severe risks  Attacks: Spying/eavesdropping, damaging objects, tripping

  • r confusing residents, emotional abuse

 Challenges to securing future robots:

 Non-expert users may think of robots as appliances  Heterogeneous home environment  Multiple robots co-opted by an attacker to work together

11/24/2009

92

slide-93
SLIDE 93

Related Work

 Challenges with ubiquitous computing in the home, e.g.:

 Edwards and Grinter. “At Home with Ubiquitous Computing: Seven

Challenges.” UbiComp „01.

 Human-robot interaction in the home, e.g.:

 Young et al. “Toward Acceptable Domestic Robots: Applying

Insights from Social Psychology.” Intl. Journal of Social Robotics „08.

 Privacy leaks in the home, e.g.:

 J. Schwartz. “Nanny-Cam May Leave a Home Exposed.” The New

York Times, April 2002.

 Usable Security, e.g.:

 Bryan D. Payne, W. Keith Edwards, "A Brief Introduction to Usable

Security," IEEE Internet Computing, vol. 12, no. 3,

11/24/2009

93

slide-94
SLIDE 94

11/24/2009

94

Questions?