

A triangular flop of hair spills across his forehead as he stares, with apparent amusement, at the object recording him from just below eye level. In another image, a boy who appears to be eight or nine years old, and whose face is clearly visible, is sprawled on his stomach across a hallway floor.
WAR ROBOTS HACK 2022 SERIES
The most intimate image we saw was the series of video stills featuring the young woman on the toilet, her face blocked in the lead image but unobscured in the grainy scroll of shots below. The photos vary in type and in sensitivity. Personal pictures in a home environment were found in the Internet taken by an iRobot’s Roomba J7 series robot vacuum.
WAR ROBOTS HACK 2022 CODE
Detecting Insecure Code Patterns in Industrial Robot Programs, Proceedings of the 15th ACM Asia Conference on Computer and Communications Security 2020.The cybersecurity status of PX4, PX4 Developer Summit Virtual 2020.Zero Trust Architecture in Robotics, Workshop on Security and Privacy in Robotics, ICRA 2020.
WAR ROBOTS HACK 2022 SOFTWARE

SROS: Current Progress and Developments, ROSCon 2017.An Experimental Security Analysis of an Industrial Robot Controller, IEEE Symposium on Security and Privacy 2017.Hacking Robots Before Skynet, Ekoparty Security Conference 2017.Securing ROS over the wire, in the graph, and through the kernel, ROSCon 2016.Tutorial 1: A study of container technologies.Tutorial 4: Basic robot forensics 2, unauthenticated updates in publisher list for specified topic ( unfinished).Tutorial 3: Capturing memory in Linux-based robots.Tutorial 2: Locating ROS logs in memory ( failed).Tutorial 1: Basic robot forensics, an unauthenticated unregistration in ROS.Tutorial 13: Sockets left open and in CLOSE_WAIT state in ROS.Tutorial 12: Unauthenticated updates in publisher list for specified topic.Tutorial 11: Unauthenticated registration/unregistration with ROS Master API.Tutorial 10: Bypassing NX with Return Oriented Programming ( WIP, unfinished).Tutorial 8: Linux Binary Protections (external).Tutorial 5: Return-Oriented Programming (ROP).

Tutorial 9: Looking at DDS middleware flaws.Tutorial 6: Looking for vulnerabilities in ROS 2.Tutorial 4: Robot sanitizers with Gazebo.Tutorial 3: Debugging output of robot sanitizers with GDB, hunting and fixing bugs.Tutorial 2: Robot sanitizers in MoveIt 2.Tutorial 1: Robot sanitizers in ROS 2 Dashing.Tutorial 3: Footprinting ROS 2 and DDS systems.Tutorial 2: Footprinting Secure ROS systems.Robot Operating System 2 (hacking ROS 2).Mobile Industrial Robots' MiR100 (hacking an industrial mobile robot).Universal Robots' UR3 (hacking a collaborative robot arm).
