<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Cybersecurity Issues in Robotic Platforms</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Adrián Campazas-Vega</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alberto Miguel-Diez</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mario Hermida-López</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Claudia Álvarez-Aparicio</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ignacio Samuel Crespo-Martínez</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ángel Manuel Guerrero-Higueras</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Grupo de Robótica de la Universidad de León</institution>
          ,
          <addr-line>Campus de Vegazana, 24071 León</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The use of robots has increased dramatically in recent years. Currently, there are multiple types of robots, from service robots, designed to help people in any kind of environment (home, work, hospitals...), to quadruped platforms, developed for critical infrastructures or the military field. Security in those platforms is crucial, since robots present vulnerabilities, they can pose a risk to both their integrity and that of the people/objects around them. In this work, a security evaluation of the Unitree A1, a quadruped robot, and the humanoid robot Pepper has been carried out, to know the security flaws that may be present, as well as the implications that it may have for the user, the environment, or the integrity of the robot. The final goal of the work is that the vulnerabilities found will be taken into account by other researchers or companies that develop that kind of robot and take into account those security problems.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Pentesting</kwd>
        <kwd>robot</kwd>
        <kwd>security</kwd>
        <kwd>Unitree A1</kwd>
        <kwd>Pepper</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <sec id="sec-1-1">
        <title>In addition to their civilian applications, these robots are</title>
        <p>
          actively utilized in the military domain [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]. Similarly, the
The use of robots has exponentially increased in the last use of service robots has also significantly increased in
decade. Throughout the year 2022, the utilization and recent years. These robots are designed to interact and
deployment of industrial robots increased by 40% in the communicate with humans to assist in the completion of
United States and 6% in Spain, according to the Spanish everyday tasks.
        </p>
        <p>
          Association of Robotics (AER) [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]. Industrial robotics has Similarly, to other types of devices, cybersecurity in
traditionally focused on the precise repetition of tasks, robotic environments is an important aspect that
besurpassing the capabilities of a human being. However, comes critical when a robot is involved in highly sensitive
in recent years, there has been a particular emphasis tasks or interacts with people. Many issues with these
on the development of robotic platforms capable of per- platforms arise because manufacturers often prioritize
forming tasks that are dificult or dangerous for humans. manufacturing cost or design over conducting product
In this regard, the most impactful robotic platforms are security testing [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. In addition to the lack of device
sequadruped robots. These robots are characterized by sup- curity by manufacturers, it is worth noting that most of
porting their weight on four legs, typically mimicking the these robotic platforms are "plug and play," meaning that
morphology of a dog. The design of these devices ofers end users often do not pay proper attention to
configuradvantages over bipedal robots due to their versatility ing the device correctly. This includes changing default
in adapting to various types of terrains. The characteris- passwords, which poses an additional security challenge.
tics of quadruped robots enable them to undertake tasks This paper aims to address some of the security issues
considered challenging or hazardous for humans. These presented by both quadruped robotic platforms and
sotasks include bomb inspection and deactivation, radia- cial robots. Specifically, a security evaluation has been
tion detection, and critical infrastructure maintenance. conducted on the quadruped robot Unitree A1 and the
semi-humanoid robot Pepper, with the objective of
idenBISEC’23: 14th International Conference on Business Information tifying potential vulnerabilities and risks that could afect
*SeCcourrrietys,pNonovdeinmgbaerut2h4o,r2.023, Niš, Serbia both humans and the robot itself, as well as the
environ$ acamv@unileon.es (A. Campazas-Vega); ment in which it is deployed. The severity of the
discovamigud00@estudiantes.unileon.es (A. Miguel-Diez); ered vulnerabilities has been assessed using the CVSSv3
mherml00@estudiantes.unileon.es (M. Hermida-López); (Common Vulnerability Scoring System version 3)
stancalvaa@unileon.es (C. Álvarez-Aparicio); icrem@unileon.es dard. This work and the methods employed can serve as
(I. S. Crespo-Martínez); am.guerrero@unileon.es
(Á. M. Guerrero-Higueras) a starting point for other researchers interested in
eval0000-0001-8237-5962 (A. Campazas-Vega); 0000-0002-7465-8054 uating the security risks of other models of quadruped
(C. Álvarez-Aparicio); 0000-0002-3154-0144 (I. S. Crespo-Martínez); robots and social robots.
0000-0001©-8202247C7o-p0yr7ig0h0tfo(rÁth.isMpa.peGrbuyietsraruethroors-. HUseigpeurmeirttaeds)under Creative Commons License The rest of the article is organized as follows: In
SecCPWrEooUrckReshdoinpgs IhStpN:/c1e6u1r3-w-0s.o7r3g ACttEribUutRion W4.0oInrtekrnsahtioonpal (PCCroBYce4.0e).dings (CEUR-WS.org) tion 2, related works are presented. Section 3 introduces
the architecture and characteristics of the robots Unitree
A1 and Pepper, along with the method for assessing the
severity of discovered vulnerabilities. Section 4 provides
details on the various experiments conducted and the
implications of exploiting the vulnerabilities in a
realworld environment. Finally, Section 5 ofers the current
conclusions.
        </p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Related Works</title>
      <p>
        Despite the growing popularity of quadruped robots,
there is limited research on the cybersecurity of these
robots. Most research in this field focuses on the physical
security of robots, such as collision prevention [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] and
stability on diferent terrains [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. However, there are some
works that examine overall security in robotic devices. In
[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], the authors analyzed potential security issues that
different types of robots might have and listed some generic
recommendations that could be implemented to enhance
the overall security of robotics. One of the conclusions
reached by the authors is that cyberattacks on robots Figure 1: Unitree A1 of the Robotics Group of the University
used in critical infrastructures and military environments of León.
are the most damaging and dangerous. It’s important to
note that the current use of quadruped robots
primarily focuses on these two areas. Another work related
to robotic security is presented in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. In this work, the 3.1. Unitree A1
authors identified security threats in the field of robotics, As mentioned in Section 1, to conduct the cybersecurity
classified them based on the afected layer of the robot’s evaluation of quadruped robots, the Unitree A1 robot, as
architecture, and analyzed their impact and potential shown in Figure 1, has been utilized. The Unitree A1 is
countermeasures. Other works, such as [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] and [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], dis- manufactured by Unitree Robotics, a Chinese company
cuss security issues associated with ROS (Robot Operat- that has been producing quadruped devices since 2016
ing System). ROS is a set of software libraries and tools [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
that help create applications for robots. While Pepper The Unitree A1 robot can reach a maximum speed of
and Unitree A1 do not come with ROS by default, it is 3.3 m/s at a particular moment and can carry objects with
possible to install ROS on the latter. a maximum weight of 5 kg. Additionally, it is equipped
      </p>
      <p>
        Finally, regarding the specific analysis of the Pepper with sensors that enable it to maintain proper balance
robotic platform, in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], the authors conducted a security during operation, preventing the robot from falling on
evaluation of the semi-humanoid robot "Pepper" from uneven terrain. The device has a battery life ranging
SoftBank Robotics. The authors demonstrated that this from 1 to 2.5 hours, depending on the mode in which it
robot had critical vulnerabilities that needed to be ad- is used [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
dressed by the manufacturer. This article expands on Regarding the cameras and sensors, the Unitree A1 is
the work done in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], confirming that years later, the equipped with a RealSense camera [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], located on its
vulnerabilities identified by the authors still exist and "head." This camera features a depth sensor that utilizes
uncovering new vulnerabilities in the platform. a combination of infrared and laser technologies to
measure the distance between objects and the camera. This
3. Materials and Methods enables it to capture 3D images and detect objects in
realtime. In the field of robotics, these types of cameras are
In this section, the characteristics of the robots analyzed used to implement autonomous functions in the robot,
in this work are presented. Additionally, the methodol- allowing it to navigate around obstacles and create a 3D
ogy used to conduct the experiments and the evaluation map of the area in which the robot is deployed [
        <xref ref-type="bibr" rid="ref13 ref14">13, 14</xref>
        ].
method for these experiments are described. At the connectivity level, the quadruped robot has
several ports on the upper part of its "body" that the user
can utilize to interact with various interfaces of the robot.
      </p>
      <p>These connections include four USB ports, two HDMI
ports, and two Ethernet ports.</p>
      <p>Teleoperation of the robot can be performed using a
mobile application developed by the manufacturer or
by using the controller that comes with the robot. The
controller includes two joysticks and a directional pad
(D-pad) for easy robot maneuvering. According to the
manual, the controller connects directly to the robot’s
control board via radio frequency. On the other hand,
Unitree’s mobile application is compatible with both iOS
and Android devices. The app allows users to control the
robot, view the real-time camera feed, and utilize a
simulator of the Unitree A1. However, despite the robot being
available for commercial use since 2020, some features
of the app may not work correctly or require specific
parameter configurations. Furthermore, Unitree provides
users with a Software Development Kit (SDK) to develop
custom code for the robot. This SDK enables developers
to create their own applications and functionalities for
the Unitree A1.</p>
      <sec id="sec-2-1">
        <title>3.2. Pepper</title>
        <p>Pepper is the world’s first social humanoid robot capable
of recognizing human faces and basic emotions. It is
optimized for interaction and can engage with people
through conversation or its touchscreen interface. Pepper
is designed for intuitive and natural interaction. It finds
common applications in various fields such as hospitality,
retail, healthcare, education, entertainment, and personal
assistance. Its appearance is depicted in Figure 2.</p>
        <p>Pepper has 20 degrees of freedom to achieve more
natural and expressive movements. Additionally, it features
voice recognition available in 15 languages and
perception modules to recognize and interact with the person
in front of it. In terms of physical sensors, the robot
is equipped with touch sensors, LEDs, microphones for
multimodal interaction, infrared sensors, bumpers, an
inertial unit, and 2D and 3D cameras to enable autonomous
and omnidirectional navigation. Pepper provides an API
that allows for the development of custom applications
and functionalities for this robotic platform.</p>
      </sec>
      <sec id="sec-2-2">
        <title>3.3. Evaluation</title>
        <p>
          To assess the severity of the discovered vulnerabilities,
the Common Vulnerability Scoring System (CVSS)
version 3 has been employed [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]. CVSS, or Common
Vulnerability Scoring System, is an open and widely used
framework that defines metrics for communicating the
characteristics, impact, and severity of vulnerabilities
affecting security elements. It provides a standardized way
to evaluate and communicate the seriousness of security
vulnerabilities.
        </p>
        <p>CVSSv3 categorizes vulnerabilities with a numerical
value between 0 and 10. A vulnerability with a score
between 0.1 and 3.9 is considered to have low severity.
Vulnerabilities with a score between 4.0 and 6.9 are
classiifed as having moderate severity. Finally, vulnerabilities
with a score between 7.0 and 10.0 are considered to have
high severity. This scoring system provides a clear way
to assess the seriousness of vulnerabilities and helps
organizations prioritize their remediation eforts.</p>
        <p>CVSS defines metrics to assess the likelihood that a
vulnerability will be exploited. The metrics defined by
the CVSSv3 standard can be seen in Table 1.</p>
      </sec>
      <sec id="sec-2-3">
        <title>3.4. Methodology</title>
        <sec id="sec-2-3-1">
          <title>The methodology used for the analysis of robotic plat</title>
          <p>forms is similar to that employed in conventional
computer systems. Below, we outline the three stages carried
out to assess the security of the Unitree A1 robot and the
Pepper service robot:
• Information Gathering: In this step,
information is collected about the robotic platform,
including the type of hardware and sensors used
by the device, the operating system it runs on,
the services it executes, and the nature of the
communications that take place.
• Vulnerability Analysis: Tests are conducted
to identify vulnerabilities in the robotic system.</p>
          <p>This analysis encompasses both hardware and
software aspects, as well as the systems deployed vulnerabilities. All vulnerabilities listed below are
associby the robot. ated with an impact vector generated using the CVSSv3
• Exploitation of Identified Vulnerabilities : Fi- standard, as discussed in Section 3. The discovered
vulnally, identified vulnerabilities are exploited to de- nerabilities, which are explained below, are presented in
termine the extent to which these security flaws Table 2.
pose a risk to the safety of the robot itself and its
surrounding environment.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>4. Experimentation and Discussion</title>
      <sec id="sec-3-1">
        <title>The evaluation conducted on these robots aims to identify vulnerabilities that may be present in the devices and could be extrapolated to other robotic platforms. The following will demonstrate how both robots share common</title>
        <sec id="sec-3-1-1">
          <title>4.1. Common vulnerabilities in both robots</title>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>In this subsection, we present the vulnerabilities that are common to both robots.</title>
        <p>4.1.1. Lack of protection against brute force
attacks in SSH protocol</p>
      </sec>
      <sec id="sec-3-3">
        <title>One way to access the embedded computers inside the</title>
        <p>
          robot is through the SSH protocol. This connection
allows for configuring certain aspects of the robot, such
as the AP password, and even controlling the robot
using the installed SDK. Both the Unitree A1 robot and
Pepper do not implement security measures to prevent Figure 3: On the left, view of the teleoperator after being
brute-force attacks on the SSH servers installed in the attacked. On the right, real image of the robot’s situation.
robot. To verify that the SSH servers are vulnerable to
dictionary attacks or brute-force attacks, the open-source
tool Hydra has been used [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ].
        </p>
        <p>
          If an attacker gains access to the robot’s internal com- actual situation, potentially enabling an attacker to cause
puters, they could potentially control the robot remotely harm to the robot itself or its surrounding environment.
and even delete system files, rendering the device inop- To exploit this vulnerability, an ARP Spoofing attack
erable. Furthermore, since the default password for both was conducted using the "arpspoof" tool [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]. This
atdevices is considered insecure today and is present in tack is considered one of the most dangerous on LAN
a wide range of online dictionaries, this vulnerability is networks [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]. The attacker manipulates both the robot’s
deemed severe with a score of 9 and the following CVSS and the victim’s ARP tables, associating their MAC
advector: AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H. dress with the victim’s IP address, thereby redirecting
all trafic to a machine controlled by the attacker.
Subse4.1.2. Lack of verification against MiTM attack quently, the attacker redirects the trafic arriving from
the user to a web server identical to the robot’s but
unNeither the quadruped robot Unitree A1 nor the social der the attacker’s control. In this case, the web server
robot Pepper implement security measures to prevent deployed by the Unitree is MJPG-Streamer, which is
puban attacker with access to the robot’s network from per- licly available on GitHub [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ].
forming a Man-in-the-Middle (MitM) attack. This would The consequences of such attacks can be critical in
allow the attacker to intercept unencrypted communica- certain environments. For instance, in Figure 3, can see
tions and manipulate them at will. Here’s an example of that the person operating the robot perceives an
obstaclethe vulnerability in the Unitree A1 robot: The A1 robot free corridor, while in reality, the robot is in a hazardous
deploys a web server that serves images from the robot’s situation near a set of stairs.
camera, allowing an operator to teleoperate the device This vulnerability has a high impact with a score
remotely. of 8.0 and the following associated CVSSv3 vector:
        </p>
        <p>
          An attacker who has access to the network deployed by AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. A video has
the robot can carry out a MitM attack, altering the video been created to replicate the experiment performed [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ].
transmission from the robot’s camera with another feed
controlled by the attacker, without the victim noticing 4.1.3. Denial of service to the robot’s Web server
any diference. If the robot is used in critical situations,
the operator controlling the robot will not perceive the
The web servers deployed by both robots are vulnerable
to denial-of-service (DoS) attacks. The process to
exesimply by plugging them in. These devices are referred to
as Rubber Ducky [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ]. Furthermore, the exposure of USB
ports also makes the robot vulnerable to attacks carried
out with a USB killer device [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ]. This type of device
discharges a high-voltage surge, damaging the components
of the connected device. This vulnerability has a high
impact with a score of 7.5, and the associated CVSSv3
vector is AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L.
4.2.2. Web server without authentication
        </p>
      </sec>
      <sec id="sec-3-4">
        <title>Access to the live video feed from the robot’s camera</title>
        <p>does not have an authentication system. Therefore, any
user connected to the network emitted by the robot can
view the real-time image either through the device’s web
server or via the mobile application. To be considered
secure, this functionality should require authentication.</p>
        <p>This vulnerability has a moderate impact with
a score of 5.7 and the following CVSSv3 vector:
AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N.</p>
        <sec id="sec-3-4-1">
          <title>4.3. Pepper robot vulnerabilities</title>
        </sec>
      </sec>
      <sec id="sec-3-5">
        <title>In this section, the vulnerabilities that exclusively afect the social robot Pepper are presented.</title>
        <p>4.3.1. API access without authentication
The API implemented by Pepper allows for complete
control of the device. Access to the API occurs without
any form of authentication, so an attacker only needs
to be on the same network as the robot. Interaction
with the API is done through port 9559 using the Python
programming language, although C++ and Java are also
supported.</p>
        <p>This vulnerability has a high impact with a
score of 7.5, and the associated CVSSv3 vector is:
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
4.3.2. Communication with the web server
without encryption</p>
      </sec>
      <sec id="sec-3-6">
        <title>The web server used by the robot utilizes unencrypted</title>
        <p>HTTP communication. An attacker connected to the
network can snif the trafic and obtain the access credentials
for the web server, as depicted in Figure 5.</p>
        <p>This vulnerability has a moderate impact with
a score of 6.5 and the following CVSSv3 vector:
AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N.
cute this attack is quite similar to the previous one, as it
relies on the ARP Spoofing technique in both cases. To
exploit this vulnerability, the attacker must manipulate
the victim’s and robot’s ARP tables to intercept trafic.
Once the attack is successfully carried out, all packets
are received by the attacker, who will then discard these
packets, causing the legitimate user to lose the
connection to the web server. This vulnerability has a moderate
impact with a score of 5.7 and the following associated
CVSSv3 vector: AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H.</p>
        <sec id="sec-3-6-1">
          <title>4.2. Unitree A1 robot vulnerabilities</title>
        </sec>
      </sec>
      <sec id="sec-3-7">
        <title>This section shows vulnerabilities that exclusively afect the Unitree A1 robot.</title>
        <p>4.2.1. Unsecured physical ports
Figure 4 shows the port distribution of the robot. The
main vulnerability lies in the fact that the robot does
not request any form of authentication when connected
through the provided ports.</p>
        <p>The lack of authentication poses several security im- 5. Conclusions
plications, even without connecting standard input and
output devices such as a keyboard and monitor. Cur- The use of robotics is becoming increasingly widespread;
rently, there are USB-like devices that function as input however, it is essential that progress in this field is
accomand output devices, enabling the execution of commands
panied by a thorough review of potential vulnerabilities
in these devices.</p>
        <p>In this work, a security evaluation has been conducted
on the quadruped robot Unitree A1 and the service robot
Pepper. Several potential vulnerabilities have been
identified that could be exploited by an attacker to gain
unauthorized access to the robot or control its movements and
actions. For each of the vulnerabilities discovered in this
work, a Common Vulnerabilities and Exposures (CVE)
has been requested. The CVE program’s mission is to
identify, define, and catalog publicly disclosed
cybersecurity vulnerabilities.</p>
        <p>To continue advancing in the field of robotics, it is
necessary to implement security measures such as user
authentication and authorization, encryption of device
communications, and regular security testing to detect
and address potential vulnerabilities in the software of
various robotic platforms. It is important to emphasize
that the cybersecurity of quadruped and social robots is
a critical issue that must be addressed by manufacturers,
developers, and users of these devices to ensure their
proper functioning and protect them against potential
malicious attacks that could pose a security risk to the
robot itself or to people in its vicinity.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Acknowledgment</title>
      <sec id="sec-4-1">
        <title>This research has been partially supported un</title>
        <p>der the grant PID2021-126592OB-C21 funded
by MCIN/AEI/10.13039/501100011033 and by
ERDF A way of making Europe and under
the Grant TED2021-132356B-I00 funded by
MCIN/AEI/10.13039/501100011033 and by the
"European Union NextGenerationEU/PRTR.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>A. E.</surname>
          </string-name>
          de Robótica y Automatización,
          <source>La importancia de la ciberseguridad en la industria 4</source>
          .0, https://www.aer-automation.com/wp-content/ uploads/2023/01/Ciberseguridad_AERPaper.pdf ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>K.</given-names>
            <surname>Geldenhuys</surname>
          </string-name>
          ,
          <article-title>Killer robots are real</article-title>
          ,
          <source>Servamus Community-based Safety and Security Magazine</source>
          <volume>116</volume>
          (
          <year>2023</year>
          )
          <fpage>20</fpage>
          -
          <lpage>22</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>G. W.</given-names>
            <surname>Clark</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. V.</given-names>
            <surname>Doran</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. R.</given-names>
            <surname>Andel</surname>
          </string-name>
          ,
          <article-title>Cybersecurity issues in robotics, in: 2017 IEEE conference on cognitive and computational aspects of situation management (CogSIMA)</article-title>
          , IEEE,
          <year>2017</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>R.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Bera</surname>
          </string-name>
          ,
          <article-title>Walking model of jansen mechanism-based quadruped robot and application to obstacle avoidance</article-title>
          ,
          <source>Arabian Journal for Science and Engineering</source>
          <volume>45</volume>
          (
          <year>2020</year>
          )
          <fpage>653</fpage>
          -
          <lpage>664</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Y. H.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. H.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. T.</given-names>
            <surname>Phan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Kang</surname>
          </string-name>
          , U. Kim,
          <string-name>
            <given-names>J.</given-names>
            <surname>Jeon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. R.</given-names>
            <surname>Choi</surname>
          </string-name>
          ,
          <article-title>Trajectory design and control of quadruped robot for trotting over obstacles</article-title>
          ,
          <source>in: 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)</source>
          , IEEE,
          <year>2017</year>
          , pp.
          <fpage>4897</fpage>
          -
          <lpage>4902</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>C.</given-names>
            <surname>Cerrudo</surname>
          </string-name>
          , L. Apa,
          <article-title>Hacking robots before skynet</article-title>
          ,
          <source>IOActive Website</source>
          (
          <year>2017</year>
          )
          <fpage>1</fpage>
          -
          <lpage>17</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.-Y.</given-names>
            <surname>Jeong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.-J.</given-names>
            <surname>Choi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.-J.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.-M.</given-names>
            <surname>Shin</surname>
          </string-name>
          , J.-H. Han,
          <string-name>
            <given-names>G</given-names>
            .
            <surname>-H. Jung</surname>
          </string-name>
          , K.-G. Kim,
          <article-title>A study on ros vulnerabilities and countermeasure</article-title>
          ,
          <source>in: Proceedings of the Companion of the 2017 ACM/IEEE International Conference on Human-Robot Interaction</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>147</fpage>
          -
          <lpage>148</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>R.</given-names>
            <surname>White</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. H. I.</given-names>
            <surname>Christensen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. M.</given-names>
            <surname>Quigley</surname>
          </string-name>
          , Sros:
          <article-title>Securing ros over the wire, in the graph, and through the kernel</article-title>
          ,
          <source>arXiv preprint arXiv:1611.07060</source>
          (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Giaretta</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. De Donno</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Dragoni</surname>
          </string-name>
          ,
          <article-title>Adding salt to pepper: A structured security assessment over a humanoid robot</article-title>
          ,
          <source>in: Proceedings of the 13th International Conference on Availability, Reliability and Security</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>U.</given-names>
            <surname>Robotics</surname>
          </string-name>
          , Unitree, https://m.unitree.com/,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>U.</given-names>
            <surname>Robotics</surname>
          </string-name>
          ,
          <article-title>Unitree a1 user manual</article-title>
          , https://www.mybotshop.de/Datasheet/ UnitreeA1_User_Manual_
          <year>v1</year>
          .0.pdf/,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>F. L.</given-names>
            <surname>Siena</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Byrom</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Watts</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Breedon</surname>
          </string-name>
          ,
          <article-title>Utilising the intel realsense camera for measuring health outcomes in clinical research</article-title>
          ,
          <source>Journal of medical systems 42</source>
          (
          <year>2018</year>
          )
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>J.</given-names>
            <surname>Bayer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Faigl</surname>
          </string-name>
          ,
          <article-title>On autonomous spatial exploration with small hexapod walking robot using tracking camera intel realsense t265</article-title>
          ,
          <source>in: 2019 European Conference on Mobile Robots (ECMR)</source>
          , IEEE,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>J.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Niu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>Obstacle avoidance methods for rotor uavs using realsense camera, in: 2017 Chinese Automation Congress (CAC)</article-title>
          , IEEE,
          <year>2017</year>
          , pp.
          <fpage>7151</fpage>
          -
          <lpage>7155</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>INCIBE</surname>
          </string-name>
          , Métricas de evaluación de vulnerabilidades:
          <source>Cvss</source>
          <volume>3</volume>
          .0, https://.incibe-cert.es/blog/cvss3-0/,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>V.</given-names>
            <surname>Hauser</surname>
          </string-name>
          , Hydra, https://github.com/ vanhauser-thc/thc-hydra/,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>D.</given-names>
            <surname>Song</surname>
          </string-name>
          , arpspoof
          <article-title>- intercept packets on a switched lan</article-title>
          , https://manpages.ubuntu.com/manpages/ bionic/man8/arpspoof.8.html,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>G.</given-names>
            <surname>Jinhua</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Kejian</surname>
          </string-name>
          ,
          <article-title>Arp spoofing detection algorithm using icmp protocol</article-title>
          , in: 2013 International Conference on Computer Communication and Informatics, IEEE,
          <year>2013</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19] jacksonliam, Servidor web mjpg-streamer, https: //github.com/jacksonliam/,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>A.</given-names>
            <surname>Miguel</surname>
          </string-name>
          ,
          <article-title>Ataque man in the middle al unitree a1</article-title>
          , https://bit.ly/3JGCGDl,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>INCIBE</surname>
          </string-name>
          ,
          <string-name>
            <surname>Rubber</surname>
            <given-names>ducky</given-names>
          </string-name>
          , ¿
          <article-title>una simple memoria usb?</article-title>
          , https://www.incibe.es/empresas/blog/ rubber-ducky
          <article-title>-simple-memoria-</article-title>
          <string-name>
            <surname>usb</surname>
          </string-name>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>O.</given-names>
            <surname>Angelopoulou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Pourmoafi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Jones</surname>
          </string-name>
          , G. Sharma,
          <article-title>Killing your device via your usb port</article-title>
          ,
          <source>in: Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security &amp; Assurance (HAISA</source>
          <year>2019</year>
          ),
          <article-title>The Centre for Security</article-title>
          ,
          <source>Communications and Network Research (CSCAN)</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>61</fpage>
          -
          <lpage>72</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>