cageymaru
Fully [H]
- Joined
- Apr 10, 2003
- Messages
- 21,914
Researchers at Brown University found more than 100 robots in research labs that were vulnerable to outside manipulation and sabotage by doing an online scan of the internet. By looking explicitly for devices running the Robot Operating System or (ROS), the team of researchers were able to take control of fully functional robots and operate cameras, move the robot's neck, and even make the robot speak. A nefarious hacker could cause injuries, steal research work, or worse.
ROS is the dominant platform used in research robotics. It can be thought of like a robot's central nervous system. The platform aggregates all of a robot's various components -- its cameras, sensors and actuators -- and ties them to a central computing node. Through an external computer and a network connection, an operator connects to the central node to give commands to the robot. "ROS is a great tool for robotics research, but the designers explicitly left security to the end users," said Stefanie Tellex, a roboticist at Brown and a study co-author. "It doesn't require any authentication to connect to a ROS master, which means if you're running ROS and it's not behind a firewall, anyone can connect to your robot."
ROS is the dominant platform used in research robotics. It can be thought of like a robot's central nervous system. The platform aggregates all of a robot's various components -- its cameras, sensors and actuators -- and ties them to a central computing node. Through an external computer and a network connection, an operator connects to the central node to give commands to the robot. "ROS is a great tool for robotics research, but the designers explicitly left security to the end users," said Stefanie Tellex, a roboticist at Brown and a study co-author. "It doesn't require any authentication to connect to a ROS master, which means if you're running ROS and it's not behind a firewall, anyone can connect to your robot."