An overview of artificial intelligence used in malware
Artificial intelligence (AI) and machine learning (ML) methods are increasingly adopted in
cyberattacks. AI supports the establishment of covert channels, as well as the obfuscation of …
cyberattacks. AI supports the establishment of covert channels, as well as the obfuscation of …
Security Considerations in AI-Robotics: A Survey of Current Methods, Challenges, and Opportunities
Robotics and Artificial Intelligence (AI) have been inextricably intertwined since their
inception. Today, AI-Robotics systems have become an integral part of our daily lives, from …
inception. Today, AI-Robotics systems have become an integral part of our daily lives, from …
[HTML][HTML] A data-driven multi-perspective approach to cybersecurity knowledge discovery through topic modelling
Cybersecurity is crucial for protecting the privacy of digital systems, maintaining economic
stability, and ensuring national security. This study presents a comprehensive approach to …
stability, and ensuring national security. This study presents a comprehensive approach to …
On the (in) security of secure ros2
Robot Operating System (ROS) has been the mainstream platform for research and
development of robotic applications. This platform is well-known for lacking security features …
development of robotic applications. This platform is well-known for lacking security features …
Security of industrial robots: Vulnerabilities, attacks, and mitigations
Industrial robots are prototypical cyber-physical systems that are widely deployed in smart
and automated manufacturing systems. Industrial robots perform physical operations …
and automated manufacturing systems. Industrial robots perform physical operations …
Out of control: stealthy attacks against robotic vehicles protected by control-based techniques
Robotic vehicles (RVs) are cyber-physical systems that operate in the physical world under
the control of software functions. They are increasing in adoption in many industrial sectors …
the control of software functions. They are increasing in adoption in many industrial sectors …
An investigation of byzantine threats in multi-robot systems
Multi-Robot Systems (MRSs) show significant advantages to deal with complex tasks
efficiently. However, the system complexity inevitably enlarges the attack surface and adds …
efficiently. However, the system complexity inevitably enlarges the attack surface and adds …
Stealthy attacks against robotic vehicles protected by control-based intrusion detection techniques
Robotic vehicles (RV) are increasing in adoption in many industrial sectors. RVs use auto-
pilot software for perception and navigation and rely on sensors and actuators for operating …
pilot software for perception and navigation and rely on sensors and actuators for operating …
Fingerprinting movements of industrial robots for replay attack detection
Industrial robots are prototypical cyber-physical systems widely deployed in (smart)
manufacturing, which operate according to the operation code uploaded by the human …
manufacturing, which operate according to the operation code uploaded by the human …
Detecting replay attacks against industrial robots via power fingerprinting
Industrial robots have been shown to suffer from replay attacks, via which adversaries not
only manipulate the robot operation by downloading malicious code, but also prevent the …
only manipulate the robot operation by downloading malicious code, but also prevent the …