Researchers from Politecnico di Milano and Trend Micro conducted an audit of the information security design of commonly used industrial robots and found that these devices are extremely insecure: robots could be easily reprogrammed to violate their safety parameters, both by distorting the robots' ability to move accurately and by changing the movements the robots attempt to perform; hacked robots can also be made to perform movements with more force than is safe; normal safety measures that limit speed and force can be disabled; robots can be made to falsify their own telemetry, fooling human operators; emergency manual override switches can be disabled or hidden; robots can be silently switched from manual to automatic operation, making them move suddenly and forcefully while dangerously close to oblivious, trusting humans; and of course, robots can be caused to manufacture faulty goods that have to be remanufactured or scrapped.
All of this is possible because industrial robotic control systems lack even the most basic security -- instead of cryptographically hashing passwords, they store them in the clear (with a single, deterministic XOR operation to provide a useless hurdle against hackers); controllers expose an FTP process during bootup that accepts new firmware loads without authentication; network-level commands are not encrypted or signed; controllers use hardcoded usernames and passwords; memory corruption attacks are easy and devastating; the runtimes for the control instructions are poorly isolated from other processes -- the paper goes on and on.
Industrial robots epitomize all the problems of the Internet of Shit -- operators who have little or no security expertise, a lack of easy updating, and lazy, sloppy design. But whereas killing someone with the Internet of Shit involves things like turning off the heat in February in Minnesota, industrial robots are giant, barely constrained killing machines.
We explored, theoretically and experimentally, the challenges and impacts of the security of modern industrial robots. We built an attacker model, and showed how an attacker can compromise a robot controller and gain full control of the robot, altering the production process. We explored the potential impacts of such attacks and experimentally evaluated the resilience of a widespread model of industrial robot (representative of a de facto standard architecture) against cyber attacks. We then discussed the domain-specific barriers that make smooth adoption of countermeasures a challenging task.
Interesting future research directions include exploring multi-robot deployments, co-bots, and the safety and security implications of the adoption of wireless connections. Also, an improved survey would produce statistically significant results. We definitely plan to analyze controllers from other vendors, to further confirm the generality of our approach.
An Experimental Security Analysis of an Industrial Robot Controller [Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, Andrea Maria Zanchettin, and Stefano Zanero/Industrial Robots Security]
(via 4 Short Links)