The social influence of robots on people and the insecurities this can bring should not be underestimated. Research conducted by Kaspersky and Ghent University has found that robots can effectively extract sensitive information from people who trust them, by persuading them to take unsafe actions. For example, in certain scenarios, the presence of a robot can have a big impact on people’s willingness to give out access to secure buildings.

 

The world is rapidly moving towards increased digitalization and mobility of services, with many industries and households relying strongly on automatization and the use of robotic systems. According to some estimates, the latter will become the norm for wealthy households by 2040. Currently, most of these robotic systems are at the academic research stage and it is too early to discuss how to incorporate cybersecurity measures. However, research by Kaspersky and Ghent University has found a new and unexpected dimension of risk associated with robotics – the social impact it has on people’s behavior, as well as the potential danger and attack vector this brings.

 

The research focused on the impact of a specific social robot – one that was designed and programmed to interact with people using human-like channels, such as speech or non-verbal communication, and as many as around 50 participants. Assuming that social robots can be hacked, and that an attacker had taken control in this scenario, the research envisaged the potential security risks related to the robot actively influencing its users to take certain actions including:

 

  • Gaining access to off-limits premises. The robot was placed near a secure entrance of a mixed-use building in the city center of Ghent, Belgium, and asked staff if it could follow them through the door. By default, the area can only be accessed by tapping a security pass on the access readers of doors. During the experiment, not all staff complied with the robot’s request, but 40% did unlock the door and keep it open to let the robot into the secured area. However, when the robot was positioned as a pizza delivery person, holding a box from a well-known international take away brand, staff readily accepted the robot’s role and seemed less inclined to question its presence or its reasons for needing access to the secure area.
  • Extracting sensitive information. The second part of the study focused on obtaining personal information which would typically be used to reset passwords (including date of birth, make of first car, favorite color, etc.). Again, the social robot was used, this time inviting people to make friendly conversation. With all but one participant, the researchers managed to obtain personal information at a rate of about one item per minute.

 

“At the start of the research we examined the software used in robotic system development. Interestingly we found that designers make a conscious decision to exclude security mechanisms and instead focus on the development of comfort and efficiency. However, as the results of our experiment have shown, developers should not forget about security once the research stage is complete,”said Dmitry Galov, Security Researcher at Kaspersky

 

“In addition to the technical considerations there are key aspects to be worried about when it comes to the security of robotics. We hope that our joint project and foray into the field of cybersecurity robotics with colleagues from the University of Ghent will encourage others to follow our example and raise more public and community awareness of the issue,” added Galov.

 

“Scientific literature indicates that trust in robots and specifically social robots is real and can be used to persuade people to take action or reveal information. In general, the more human-like the robot is, the more it has the power to persuade and convince,” commented Tony Belpaeme, Professor in AI and Robotics at Ghent University.

 

“Our experiment has shown that this could carry significant security risks: people tend not to consider them, assuming that the robot is benevolent and trustworthy. This provides a potential conduit for malicious attacks and the three case studies discussed in the report are only a fraction of the security risks associated with social robots. This is why it is crucial to collaborate now to understand and address emerging risks and vulnerabilities – it will pay off in the future,” added Belpaeme.

 

A copy of the report, The potential of social robots for persuasion and manipulation:
a proof of concept study, is available on Securelist.


RECOMMENDED ARTICLE FOR TECHWORLD


 
Notes on Intel®’s Tick-Tock Model
Techworld Date Posted: 30 March 2017 10:59 AM | 73 Views
Though Intel has scrapped the previous “Tick-Tock” CPU production model, it is still good to note how well it has gone through the years.. See More
 
Notes on Intel®’s Tick-Tock Model
Techworld Date Posted: 10:59 AM | 73 Views
Though Intel has scrapped the previous “Tick-Tock” CPU production model, it is still good to note how well it has gone through the years.See More

 
IoT under fire: Kaspersky detects more than 100 million attacks on smart devices in H1 2019
Techworld Date Posted: 25 October 2019 9:35 AM | 149 Views
IoT under fire: Kaspersky detects more than 100 million attacks on smart devices in H1 2019. See More
 
IoT under fire: Kaspersky detects more than 100 million attacks on smart devices in H1 2019
Techworld Date Posted: 9:35 AM | 149 Views
IoT under fire: Kaspersky detects more than 100 million attacks on smart devices in H1 2019See More

 
Dreaming of #FindingParadise this summer? Power Mac Center gives you a chance to win a trip to El Nido!
Techworld Date Posted: 5 May 2018 3:55 PM | 54 Views
Summer days are made for adventure and fun and luckily for us, the Philippines has no shortage of beautiful places to discover. This summer, Power Mac Center (PMC) is giving you a chance to.... See More
 
Dreaming of #FindingParadise this summer? Power Mac Center gives you a chance to win a trip to El Nido!
Techworld Date Posted: 3:55 PM | 54 Views
Summer days are made for adventure and fun and luckily for us, the Philippines has no shortage of beautiful places to discover. This summer, Power Mac Center (PMC) is giving you a chance to...See More

 
Asia and Middle East a Hotbed of New Threat Actors in Q1, 2018
Techworld Date Posted: 16 April 2018 4:28 PM | 45 Views
During the first three months of the year, Kaspersky Lab researchers discovered a wave of new APT activity based mainly in Asia – more than 30% of Q1 reports were dedicated to threat operations.... See More
 
Asia and Middle East a Hotbed of New Threat Actors in Q1, 2018
Techworld Date Posted: 4:28 PM | 45 Views
During the first three months of the year, Kaspersky Lab researchers discovered a wave of new APT activity based mainly in Asia – more than 30% of Q1 reports were dedicated to threat operations...See More

David Finger
Top 3 Reasons Email Security Should Be Top of Mind for Everyone
Techworld • By: David Finger | Date Posted: 1 August 2019 9:23 AM | 690 Views
Top 3 Reasons Email Security Should Be Top of Mind for Everyone. See More
David Finger
Top 3 Reasons Email Security Should Be Top of Mind for Everyone
Techworld • By: David Finger | Date Posted: 9:23 AM | 690 Views
Top 3 Reasons Email Security Should Be Top of Mind for EveryoneSee More

 
TajMahal: Rare Spying Platform with 80 Malicious Modules, Unique Functionality and No Known Links to Current Threat Actors
Techworld Date Posted: 27 April 2019 9:46 AM | 60 Views
Kaspersky Lab researchers have uncovered a technically sophisticated cyberespionage framework that has been active since at least 2013 and appears to be unconnected to any known threat actors. The framework, which researchers have named.... See More
 
TajMahal: Rare Spying Platform with 80 Malicious Modules, Unique Functionality and No Known Links to Current Threat Actors
Techworld Date Posted: 9:46 AM | 60 Views
Kaspersky Lab researchers have uncovered a technically sophisticated cyberespionage framework that has been active since at least 2013 and appears to be unconnected to any known threat actors. The framework, which researchers have named...See More

 
YAHOO MAIL REIMAGINES THE INBOX OF THE FUTURE New App Introduces Innovative and Personalised User Experience that Cuts Through Inbox Clutter and Elevates What Matters
Techworld Date Posted: 26 September 2019 11:29 AM | 294 Views
YAHOO MAIL REIMAGINES THE INBOX OF THE FUTURE New App Introduces Innovative and Personalised User Experience that Cuts Through Inbox Clutter and Elevates What Matters . See More
 
YAHOO MAIL REIMAGINES THE INBOX OF THE FUTURE New App Introduces Innovative and Personalised User Experience that Cuts Through Inbox Clutter and Elevates What Matters
Techworld Date Posted: 11:29 AM | 294 Views
YAHOO MAIL REIMAGINES THE INBOX OF THE FUTURE New App Introduces Innovative and Personalised User Experience that Cuts Through Inbox Clutter and Elevates What Matters See More

 
Lenovo™ Sees Intelligence Transforming Everything at MWC 2018, From Devices to Data Center
Techworld Date Posted: 27 February 2018 4:51 PM | 1395 Views
Today, at MWC 2018, Lenovo reinforced its 2018 vision for technology innovations, moving its core strategy to Augmented Intelligence.. See More
 
Lenovo™ Sees Intelligence Transforming Everything at MWC 2018, From Devices to Data Center
Techworld Date Posted: 4:51 PM | 1395 Views
Today, at MWC 2018, Lenovo reinforced its 2018 vision for technology innovations, moving its core strategy to Augmented Intelligence.See More

 
Cyber-Spy Groups Are Moving towards Using Supply Chain Attacks and Legitimate Tools to Attack Financial Institutions, Warns Kaspersky Lab
Techworld Date Posted: 18 October 2017 1:15 PM | 413 Views
Yury Namestnikov of Kaspersky Lab's Global Research and Analysis Team (GReAT) in Russia discuss the tectonic shift of cyberespionage groups stealing not just data but also money of organizations in the Asia Pacific region. They.... See More
 
Cyber-Spy Groups Are Moving towards Using Supply Chain Attacks and Legitimate Tools to Attack Financial Institutions, Warns Kaspersky Lab
Techworld Date Posted: 1:15 PM | 413 Views
Yury Namestnikov of Kaspersky Lab's Global Research and Analysis Team (GReAT) in Russia discuss the tectonic shift of cyberespionage groups stealing not just data but also money of organizations in the Asia Pacific region. They...See More

 
DEVCON SUMMIT 2019: The Future of Jobs, Embracing Industry 4.0
Techworld Date Posted: 29 May 2019 2:35 PM | 72 Views
DEVCON SUMMIT 2019: The Future of Jobs, Embracing Industry 4.0. See More
 
DEVCON SUMMIT 2019: The Future of Jobs, Embracing Industry 4.0
Techworld Date Posted: 2:35 PM | 72 Views
DEVCON SUMMIT 2019: The Future of Jobs, Embracing Industry 4.0See More


Power by

Download Free AZ | Free Wordpress Themes