Simple Attacks

Learning Goals

Description

The robots work without authentication and encryption by default. This opens up the possibility of students issuing commands to and/or asking sensor values from any robot.

In this unit students will learn about some of the weaknesses of their robot programs. After demonstrating that any user can take over any robot as well as passively listen to other user's robots, we'll introduce a simple detection mechanism to identify such instances.

This is similar to any real world scenarios involving unencrypted messages or data. These are quite vulnerable to any attacks!

Glossary

Required/Authorized Commands

Activities

Common Pitfalls

Additional Reading

Back