Top Banner
Breaking the Laws of Robotics Attacking Industrial Robots Davide Quarta , Marcello Pogliani , Mario Polino, Federico Maggi , Andrea M. Zanchettin, Stefano Zanero
82

Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Feb 28, 2018

Download

Documents

votuyen
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Breaking the Laws of RoboticsAttacking Industrial Robots

Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi,Andrea M. Zanchettin, Stefano Zanero

Page 2: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Industrial robots?

Page 3: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Industrial Robot Architecture (Standards)

Controller

Page 4: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected
Page 5: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Flexibly programmable&

Connected

Page 6: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Screenshot of teach pendant + formatted code snippet on the side

Page 7: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

“Implicit” parameters

Page 8: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

“Implicit” parameters

Page 9: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Flexibly programmable&

Connected(Part 1)

Page 10: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

They are already meant to be connected

Page 11: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Attack surface

USB port

LAN

Radio

Services:Well-known (FTP) +

custom (RobAPI)

Page 12: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Connected Robots: Why?

● Now: monitoring & maintenance ISO 10218-2:2011

● Near future: active production planning and control○ some vendors expose REST-like APIs○ … up to the use of mobile devices for commands

● Future: app/library stores○ “Industrial” version of robotappstore.com?

Page 13: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Connected?

Do you considercyber attacks

against robots arealistic threat?

Page 14: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Do you considercyber attacks

against robots arealistic threat?

Page 15: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Whatconsequences

do you foresee?

Page 16: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

What are the mostvaluable assets

at risk?

Page 17: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

impact is much more important than the

vulnerabilities alone.

Page 18: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

How do we assess the impactof an attack against

industrial robots?

Page 19: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

We assess impact byreasoning on

requirements

Page 20: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Requirements: "Laws of Robotics"

Safety

Accuracy

Integrity

Page 21: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Requirements: "Laws of Robotics"

Safety

Accuracy

IntegrityAcknowledgements T.U. Munich, YouTube -- Dart Throwing with a Robotic Manipulator

Page 22: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Requirements: "Laws of Robotics"

Safety

Accuracy

Integrity

Page 23: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

violating any of these requirements

via a digital vector

Robot-Specific Attack

Safety

Accuracy

Integrity

Page 24: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Control Loop Alteration

Safety

Integrity

Attack 1

Accuracy

Page 25: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Control Loop Alteration

Safety

Integrity

Attack 1

Accuracy

Page 26: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Control Loop Alteration

Safety

Integrity

Attack 1

Accuracy

Page 28: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Calibration Tampering

Safety

Accuracy

Integrity

Attack 2

Page 29: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Calibration Tampering

Safety

Accuracy

Integrity

Attack 2

Page 30: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Production Logic Tampering

Safety

Accuracy

Integrity

Attack 3

Page 31: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Production Logic Tampering

Safety

Accuracy

Integrity

Attack 3

Page 32: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Displayed or Actual State Alteration

Safety

Accuracy

Integrity

Attacks 4+5

Page 33: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Displayed or Actual State Alteration

Safety

Accuracy

Integrity

Attacks 4+5

Page 34: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Malicious DLL

Displayed State Alteration PoC

Teach Pendant

Page 35: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Displayed State Alteration PoC

Teach Pendant

Malicious DLL

Page 36: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Is the Teach Pendant part of the safety system?

Page 37: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Is the Teach Pendant part of the safety system?

NO

Page 38: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Are thestandard safety

measurestoo limiting?

Page 39: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Do you"customize"

the safety measuresin your deployment?

Page 40: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Standards & Regulations vs. Real World

Page 41: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

...so far, we assumed the attacker has already

compromised the controller...

Page 42: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

… let’s compromise the controller!

Page 43: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Attack surface

USB port

LAN

Radio

Services:Well-known (FTP) +

custom (RobAPI)

Page 44: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

VxWorks 5.x RTOS (x86)

VxWorks 5.x RTOS (PPC)

Windows CE (ARM) .NET >=3.5

FTP, RobAPI, ...

Page 45: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

User Authorization System

User ∈ roles → grantsAuthentication: username + password

Used for FTP, RobAPI, …

Page 46: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

User Authorization System

Page 47: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

User Authorization System

tl;dr; read deployment guidelines& deactivate the default user

Page 48: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Update problems

FlexPendant

Axis Computer

Microcontrollers

Page 49: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Update problems

FlexPendant

Axis Computer

Microcontrollers

How? FTP at boot

.... plus, no code signing, nothing

Page 50: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Update problems

FlexPendant

Axis Computer

Microcontrollers

FTP? Credentials? Any credential is OK during boot!

ABBVU-DMRO-124644

Page 51: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Autoconfiguration is magic!

Page 52: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Autoconfiguration is magic!

ABBVU-DMRO-124642

Page 53: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

FTP RETR /command/whatever read system infoFTP STOR /command/command execute “commands”

Enter /command

ABBVU-DMRO-124642

Page 54: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

FTP RETR /command/whatever read system infoFTP STOR /command/command execute “commands”

Enter /command

ABBVU-DMRO-124642

Page 55: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

FTP GET /command/whatever read, e.g., env. varsFTP PUT /command/command execute “commands”

shell reboot

shell uas_disable

+ hard-coded credentials? → remote command execution

Enter /command

ABBVU-DMRO-124642

Page 56: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Let’s look at cmddev_execute_command:

shell → sprintf(buf, "%s", param)other commands → sprintf(buf, "cmddev_%s", arg)

overflow buf (on the stack) → remote code execution

Enter /command

ABBVU-DMRO-128238

Page 57: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Ex. 1: RobAPI● Unauthenticated API endpoint● Unsanitized strcpy()→ remote code executionEx. 2: Flex Pendant (TpsStart.exe)● FTP write /command/timestampAAAAAAA…..AAAAAAA● file name > 512 bytes ~> Flex Pendant DoS

Other buffer overflows

ABBVU-DMRO-124641, ABBVU-DMRO-124645

Page 58: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Takeaways

Some memory corruption

Mostly logical vulnerabilities

All the components blindly trust themain computer (lack of isolation)

Page 59: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Complete attack chain (1)

Page 60: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Complete attack chain (2)

Page 61: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Complete attack chain (3)

Page 62: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

“Sensitive” files:● Users’ credentials and permissions● Sensitive configuration parameters (e.g., PID)● Industry secrets (e.g., workpiece parameters)

File protection

Page 63: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

“Sensitive” files:● Users’ credentials and permissions● Sensitive configuration parameters (e.g., PID)● Industry secrets (e.g., workpiece parameters)

Obfuscation: bitwise XOR with a “random” key.Key is derived from the file name. Or from the content. Or …

File protection

Page 64: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

That’s how we implemented the attacks

Page 65: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Attack Surface

?

Page 66: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Flexibly programmable&

Connected(Part 2)

Page 67: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected
Page 68: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Ethernet Wireless

Page 69: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

WAN

Page 70: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Not so many...(yesterday I've just found 10 more)

Remote Exposure of Industrial Robots

Search Entries Country

ABB Robotics 5 DK, SE

FANUC FTP 9 US, KR, FR, TW

Yaskawa 9 CA, JP

Kawasaki E Controller 4 DE

Mitsubishi FTP 1 ID

Overall 28 10

Page 71: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Remote Exposure of Industrial Routers

...way many more!

Unknown which routers are actually robot-connected

Page 72: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Typical Issues

Trivially "Fingerprintable"● Verbose banners (beyond brand or model name)● Detailed technical material on vendor’s website

○ Technical manual: All vendors inspected○ Firmware: 7/12 vendors

Page 73: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Typical Issues (1)

Outdated Software Components● Application software (e.g., DropBear SSH, BusyBox)● Libraries (including crypto libraries)● Compiler & kernel● Baseband firmware

Page 74: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Typical Issues (2)

Insecure Web Interface● Poor input sanitization● E.g., code coming straight from a "beginners" blog

Cut & paste

Page 75: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Bottom lineConnect your robots with care

(follow security best practices & your robot vendor’s guidance)

Page 76: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Conclusions

Page 77: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Robots are increasingly being connected

Industrial robot-specific class of attacks

Barrier to entry: quite high, budget-wise

Black Hat Sound Bytes

Page 78: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Vendors are very responsive

As a community we really needto push hard for countermeasures

What should we do now?

Page 79: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Hints on Countermeasures

Short termAttack detection and deployment hardening

Medium termSystem hardening

Long termNew standards, beyond safety issues

Page 80: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Davide [email protected]

@_ocean

Federico [email protected]

@phretor

Marcello [email protected]

@mapogli

Papers, slides, and FAQhttp://robosec.org — http://bit.ly/2qy29oq

Questions?

Page 81: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Questions?

Page 82: Attacking Industrial Robots - Black Hat · PDF fileAttacking Industrial Robots Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, ... Technical manual: All vendors inspected

Breaking the Laws of RoboticsAttacking Industrial Robots

Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi,Andrea M. Zanchettin, Stefano Zanero