Papoutsakis, Manos, Hatzivasilis, George, Michalodimitrakis, Emmanouil, Ioannidis, Sotiris, Michael, Maria, Savva, Antonis, Nikolaou, Panagiota, Stokkou, Eftychia and Bozdemir, Gizem (2025) SESAME: Automated Security Assessment of Robots and Modern Multi-Robot Systems. Electronics, 14 (5). p. 923.
Preview |
PDF (VOR)
- Published Version
Available under License Creative Commons Attribution. 3MB |
Official URL: https://doi.org/10.3390/electronics14050923
Abstract
As robotic systems become more integrated into our daily lives, there is growing concern about cybersecurity. Robots used in areas such as autonomous driving, surveillance, surgery, home assistance, and industrial automation can be vulnerable to cyber-attacks, which could have serious real-world consequences. Modern robotic systems face a unique set of threats due to their evolving characteristics. This paper outlines the SESAME project’s methodology for the automated security analysis of multi-robot systems (MRS) and the production of Executable Digital Dependability Identities (EDDIs). Addressing security challenges in MRS involves overcoming complex factors such as increased connectivity, human–robot interactions, and a lack of risk awareness. The proposed methodology encompasses a detailed process, starting from system description and vulnerability identification and moving to the generation of attack trees and security EDDIs. The SESAME security methodology leverages structured repositories like Common Vulnerabilities and Exposures (CVE), Common Weakness Enumeration (CWE), and Common Attack Pattern Enumeration and Classification (CAPEC) to identify potential vulnerabilities and associated attacks. The introduction of Template Attack Trees facilitates modeling potential attacks, helping security experts develop effective mitigation strategies. This approach not only identifies, but also connects, specific vulnerabilities to possible exploits, thereby generating comprehensive security assessments. By merging safety and security assessments, this methodology ensures the overall dependability of MRS, providing a robust framework to mitigate cyber–physical threats.
Repository Staff Only: item control page