Can You Still See Me?: Reconstructing Robot Operations Over End-to-End Encrypted Channels

05/17/2022
by   Ryan Shah, et al.
0

Connected robots play a key role in Industry 4.0, providing automation and higher efficiency for many industrial workflows. Unfortunately, these robots can leak sensitive information regarding these operational workflows to remote adversaries. While there exists mandates for the use of end-to-end encryption for data transmission in such settings, it is entirely possible for passive adversaries to fingerprint and reconstruct entire workflows being carried out – establishing an understanding of how facilities operate. In this paper, we investigate whether a remote attacker can accurately fingerprint robot movements and ultimately reconstruct operational workflows. Using a neural network approach to traffic analysis, we find that one can predict TLS-encrypted movements with around ~60% accuracy, increasing to near-perfect accuracy under realistic network conditions. Further, we also find that attackers can reconstruct warehousing workflows with similar success. Ultimately, simply adopting best cybersecurity practices is clearly not enough to stop even weak (passive) adversaries.

READ FULL TEXT
research
09/21/2022

Reconstructing Robot Operations via Radio-Frequency Side-Channel

Connected teleoperated robotic systems play a key role in ensuring opera...
research
08/28/2018

Adversaries monitoring Tor traffic crossing their jurisdictional border and reconstructing Tor circuits

We model and analyze passive adversaries that monitors Tor traffic cross...
research
07/02/2019

Padding Ain't Enough: Assessing the Privacy Guarantees of Encrypted DNS

DNS over TLS (DoT) and DNS over HTTPS (DoH) encrypt DNS to guard user pr...
research
08/06/2020

Activity Detection from Encrypted Remote Desktop Protocol Traffic

An increasing amount of Internet traffic has its content encrypted. We a...
research
09/21/2022

Fingerprinting Robot Movements via Acoustic Side Channel

In this paper, we present an acoustic side channel attack which makes us...
research
12/12/2018

Analysis and Consideration on Management of Encrypted Traffic

There are two seemingly contradicting trends in the current Internet: in...

Please sign up or login with your details

Forgot password? Click here to reset