=Paper= {{Paper |id=Vol-3676/BISEC_paper_1 |storemode=property |title=None |pdfUrl=https://ceur-ws.org/Vol-3676/short_01.pdf |volume=Vol-3676 |authors=Adrián Campazas-Vega,Alberto Miguel-Diez,Mario Hermida-López,Claudia Álvarez-Aparicio,Ignacio Samuel Crespo-Martínez,Ángel Manuel Guerrero-Higueras }} ==None== https://ceur-ws.org/Vol-3676/short_01.pdf
                                Cybersecurity Issues in Robotic Platforms
                                Adrián Campazas-Vega1,* , Alberto Miguel-Diez1 , Mario Hermida-López1 ,
                                Claudia Álvarez-Aparicio1 , Ignacio Samuel Crespo-Martínez1 and
                                Ángel Manuel Guerrero-Higueras1
                                1
                                    Grupo de Robótica de la Universidad de León, Campus de Vegazana, 24071 León, Spain


                                                                          Abstract
                                                                          The use of robots has increased dramatically in recent years. Currently, there are multiple types of robots, from service robots,
                                                                          designed to help people in any kind of environment (home, work, hospitals...), to quadruped platforms, developed for critical
                                                                          infrastructures or the military field. Security in those platforms is crucial, since robots present vulnerabilities, they can pose a
                                                                          risk to both their integrity and that of the people/objects around them. In this work, a security evaluation of the Unitree A1, a
                                                                          quadruped robot, and the humanoid robot Pepper has been carried out, to know the security flaws that may be present, as
                                                                          well as the implications that it may have for the user, the environment, or the integrity of the robot. The final goal of the
                                                                          work is that the vulnerabilities found will be taken into account by other researchers or companies that develop that kind of
                                                                          robot and take into account those security problems.

                                                                          Keywords
                                                                          Pentesting, robot, security, Unitree A1, Pepper



                                1. Introduction                                                                                         In addition to their civilian applications, these robots are
                                                                                                                                        actively utilized in the military domain [2]. Similarly, the
                                The use of robots has exponentially increased in the last use of service robots has also significantly increased in
                                decade. Throughout the year 2022, the utilization and recent years. These robots are designed to interact and
                                deployment of industrial robots increased by 40% in the communicate with humans to assist in the completion of
                                United States and 6% in Spain, according to the Spanish everyday tasks.
                                Association of Robotics (AER) [1]. Industrial robotics has                                                 Similarly, to other types of devices, cybersecurity in
                                traditionally focused on the precise repetition of tasks, robotic environments is an important aspect that be-
                                surpassing the capabilities of a human being. However, comes critical when a robot is involved in highly sensitive
                                in recent years, there has been a particular emphasis tasks or interacts with people. Many issues with these
                                on the development of robotic platforms capable of per- platforms arise because manufacturers often prioritize
                                forming tasks that are difficult or dangerous for humans. manufacturing cost or design over conducting product
                                In this regard, the most impactful robotic platforms are security testing [3]. In addition to the lack of device se-
                                quadruped robots. These robots are characterized by sup- curity by manufacturers, it is worth noting that most of
                                porting their weight on four legs, typically mimicking the these robotic platforms are "plug and play," meaning that
                                morphology of a dog. The design of these devices offers end users often do not pay proper attention to configur-
                                advantages over bipedal robots due to their versatility ing the device correctly. This includes changing default
                                in adapting to various types of terrains. The characteris- passwords, which poses an additional security challenge.
                                tics of quadruped robots enable them to undertake tasks                                                    This paper aims to address some of the security issues
                                considered challenging or hazardous for humans. These presented by both quadruped robotic platforms and so-
                                tasks include bomb inspection and deactivation, radia- cial robots. Specifically, a security evaluation has been
                                tion detection, and critical infrastructure maintenance. conducted on the quadruped robot Unitree A1 and the
                                                                                                                                        semi-humanoid robot Pepper, with the objective of iden-
                                BISEC’23: 14th International Conference on Business Information
                                                                                                                                        tifying potential vulnerabilities and risks that could affect
                                Security, November 24, 2023, Niš, Serbia
                                *
                                  Corresponding author.                                                                                 both humans and the robot itself, as well as the environ-
                                $ acamv@unileon.es (A. Campazas-Vega);                                                                  ment in which it is deployed. The severity of the discov-
                                amigud00@estudiantes.unileon.es (A. Miguel-Diez);                                                       ered vulnerabilities has been assessed using the CVSSv3
                                mherml00@estudiantes.unileon.es (M. Hermida-López);                                                     (Common Vulnerability Scoring System version 3) stan-
                                calvaa@unileon.es (C. Álvarez-Aparicio); icrem@unileon.es
                                                                                                                                        dard. This work and the methods employed can serve as
                                (I. S. Crespo-Martínez); am.guerrero@unileon.es
                                (Á. M. Guerrero-Higueras)                                                                               a starting point for other researchers interested in eval-
                                 0000-0001-8237-5962 (A. Campazas-Vega); 0000-0002-7465-8054 uating the security risks of other models of quadruped
                                (C. Álvarez-Aparicio); 0000-0002-3154-0144 (I. S. Crespo-Martínez); robots and social robots.
                                0000-0001-8277-0700 (Á. M. Guerrero-Higueras)                                                              The rest of the article is organized as follows: In Sec-
                                           © 2024 Copyright for this paper by its authors. Use permitted under Creative Commons License
                                           Attribution 4.0 International (CC BY 4.0).                                                   tion 2, related works are presented. Section 3 introduces
                                    CEUR
                                    Workshop
                                    Proceedings
                                                  http://ceur-ws.org
                                                  ISSN 1613-0073
                                                                       CEUR Workshop Proceedings (CEUR-WS.org)




CEUR
                  ceur-ws.org
Workshop      ISSN 1613-0073
Proceedings
the architecture and characteristics of the robots Unitree
A1 and Pepper, along with the method for assessing the
severity of discovered vulnerabilities. Section 4 provides
details on the various experiments conducted and the
implications of exploiting the vulnerabilities in a real-
world environment. Finally, Section 5 offers the current
conclusions.


2. Related Works
Despite the growing popularity of quadruped robots,
there is limited research on the cybersecurity of these
robots. Most research in this field focuses on the physical
security of robots, such as collision prevention [4] and sta-
bility on different terrains [5]. However, there are some
works that examine overall security in robotic devices. In
[6], the authors analyzed potential security issues that dif-
ferent types of robots might have and listed some generic
recommendations that could be implemented to enhance
the overall security of robotics. One of the conclusions
reached by the authors is that cyberattacks on robots
                                                                Figure 1: Unitree A1 of the Robotics Group of the University
used in critical infrastructures and military environments      of León.
are the most damaging and dangerous. It’s important to
note that the current use of quadruped robots primar-
ily focuses on these two areas. Another work related
to robotic security is presented in [3]. In this work, the      3.1. Unitree A1
authors identified security threats in the field of robotics,
                                                            As mentioned in Section 1, to conduct the cybersecurity
classified them based on the affected layer of the robot’s  evaluation of quadruped robots, the Unitree A1 robot, as
architecture, and analyzed their impact and potential       shown in Figure 1, has been utilized. The Unitree A1 is
countermeasures. Other works, such as [7] and [8], dis-     manufactured by Unitree Robotics, a Chinese company
cuss security issues associated with ROS (Robot Operat-     that has been producing quadruped devices since 2016
ing System). ROS is a set of software libraries and tools   [10].
that help create applications for robots. While Pepper         The Unitree A1 robot can reach a maximum speed of
and Unitree A1 do not come with ROS by default, it is       3.3 m/s at a particular moment and can carry objects with
possible to install ROS on the latter.                      a maximum weight of 5 kg. Additionally, it is equipped
   Finally, regarding the specific analysis of the Pepper   with sensors that enable it to maintain proper balance
robotic platform, in [9], the authors conducted a security  during operation, preventing the robot from falling on
evaluation of the semi-humanoid robot "Pepper" from         uneven terrain. The device has a battery life ranging
SoftBank Robotics. The authors demonstrated that this       from 1 to 2.5 hours, depending on the mode in which it
robot had critical vulnerabilities that needed to be ad-    is used [11].
dressed by the manufacturer. This article expands on           Regarding the cameras and sensors, the Unitree A1 is
the work done in [9], confirming that years later, the      equipped with a RealSense camera [12], located on its
vulnerabilities identified by the authors still exist and   "head." This camera features a depth sensor that utilizes
uncovering new vulnerabilities in the platform.             a combination of infrared and laser technologies to mea-
                                                            sure the distance between objects and the camera. This
                                                            enables it to capture 3D images and detect objects in real-
3. Materials and Methods                                    time. In the field of robotics, these types of cameras are
In this section, the characteristics of the robots analyzed used to implement autonomous functions in the robot,
in this work are presented. Additionally, the methodol- allowing it to navigate around obstacles and create a 3D
ogy used to conduct the experiments and the evaluation map of the area in which the robot is deployed [13, 14].
method for these experiments are described.                 At the connectivity level, the quadruped robot has sev-
                                                            eral ports on the upper part of its "body" that the user
                                                            can utilize to interact with various interfaces of the robot.
                                                            These connections include four USB ports, two HDMI
ports, and two Ethernet ports.
   Teleoperation of the robot can be performed using a
mobile application developed by the manufacturer or
by using the controller that comes with the robot. The
controller includes two joysticks and a directional pad
(D-pad) for easy robot maneuvering. According to the
manual, the controller connects directly to the robot’s
control board via radio frequency. On the other hand,
Unitree’s mobile application is compatible with both iOS
and Android devices. The app allows users to control the
robot, view the real-time camera feed, and utilize a simu-
lator of the Unitree A1. However, despite the robot being
available for commercial use since 2020, some features
of the app may not work correctly or require specific pa-
rameter configurations. Furthermore, Unitree provides
users with a Software Development Kit (SDK) to develop
custom code for the robot. This SDK enables developers
to create their own applications and functionalities for
the Unitree A1.

3.2. Pepper
Pepper is the world’s first social humanoid robot capable
of recognizing human faces and basic emotions. It is
optimized for interaction and can engage with people          Figure 2: Appearance of the Pepper service robot.
through conversation or its touchscreen interface. Pepper
is designed for intuitive and natural interaction. It finds
common applications in various fields such as hospitality,    between 0.1 and 3.9 is considered to have low severity.
retail, healthcare, education, entertainment, and personal    Vulnerabilities with a score between 4.0 and 6.9 are classi-
assistance. Its appearance is depicted in Figure 2.           fied as having moderate severity. Finally, vulnerabilities
   Pepper has 20 degrees of freedom to achieve more nat-      with a score between 7.0 and 10.0 are considered to have
ural and expressive movements. Additionally, it features      high severity. This scoring system provides a clear way
voice recognition available in 15 languages and percep-       to assess the seriousness of vulnerabilities and helps or-
tion modules to recognize and interact with the person        ganizations prioritize their remediation efforts.
in front of it. In terms of physical sensors, the robot          CVSS defines metrics to assess the likelihood that a
is equipped with touch sensors, LEDs, microphones for         vulnerability will be exploited. The metrics defined by
multimodal interaction, infrared sensors, bumpers, an in-     the CVSSv3 standard can be seen in Table 1.
ertial unit, and 2D and 3D cameras to enable autonomous
and omnidirectional navigation. Pepper provides an API
that allows for the development of custom applications        3.4. Methodology
and functionalities for this robotic platform.               The methodology used for the analysis of robotic plat-
                                                             forms is similar to that employed in conventional com-
3.3. Evaluation                                              puter systems. Below, we outline the three stages carried
                                                             out to assess the security of the Unitree A1 robot and the
To assess the severity of the discovered vulnerabilities, Pepper service robot:
the Common Vulnerability Scoring System (CVSS) ver-
sion 3 has been employed [15]. CVSS, or Common Vul-               • Information Gathering: In this step, informa-
nerability Scoring System, is an open and widely used                tion is collected about the robotic platform, in-
framework that defines metrics for communicating the                 cluding the type of hardware and sensors used
characteristics, impact, and severity of vulnerabilities af-         by the device, the operating system it runs on,
fecting security elements. It provides a standardized way            the services it executes, and the nature of the
to evaluate and communicate the seriousness of security              communications that take place.
vulnerabilities.                                                  • Vulnerability Analysis: Tests are conducted
   CVSSv3 categorizes vulnerabilities with a numerical               to identify vulnerabilities in the robotic system.
value between 0 and 10. A vulnerability with a score                 This analysis encompasses both hardware and
Table 1
Metrics associated with the CVSS vector in version 3
  Symbol       Description
  AV           Attack Vector: Determines how the vulnerability can be exploited, assessing the accessibility requirements.
               The values of this metric are:
               • Network (N)
               • Adjacent (A)
               • Local (L)
               • Physical (P)
  AC           Attack Complexity: Determines the attack complexity required to make use of the vulnerability. The values
               of this metric are:
               • Low (L)
               • High (H)
  PR           Privileges Required: Determines the level of privileges an attacker must have before he can successfully
               exploit a vulnerability. The values of this metric are:
               • None (N)
               • Low (L)
               • High (H)
  UI           User Interaction: Determines if user intervention is necessary for successful exploitation of the vulnerability.
               The levels of this metric are:
               • None (N)
               • Required (R)
  S            Scope: Determines whether successful exploitation of the vulnerability can indirectly affect other components
               outside the scope of the system or application. The values of this metric are as follows:
               • Unchanged (U)
               • Changed (C)
  C            Confidentiality Impact: Confidentiality is the ownership of a document, message or data that is only
               authorized to be read or understood by certain persons or entities. The values of this metric are as follows:
               • None (N)
               • Low (L)
               • High (H)
  I            Integrity Impact: Integrity is the property of a document, message or data that guarantees the veracity of
               the information. The values for this metric are as follows:
               • None (N)
               • Low (L)
               • High (H)
  D            Availability Impact: Availability is the property of a system, service, or application that is accessible without
               impediments. The values for this metric are as follows:
               • None (N)
               • Low (L)
               • High (H)



         software aspects, as well as the systems deployed        vulnerabilities. All vulnerabilities listed below are associ-
         by the robot.                                            ated with an impact vector generated using the CVSSv3
       • Exploitation of Identified Vulnerabilities: Fi-          standard, as discussed in Section 3. The discovered vul-
         nally, identified vulnerabilities are exploited to de-   nerabilities, which are explained below, are presented in
         termine the extent to which these security flaws         Table 2.
         pose a risk to the safety of the robot itself and its
         surrounding environment.                                  4.1. Common vulnerabilities in both
                                                                        robots
4. Experimentation and Discussion                           In this subsection, we present the vulnerabilities that are
The evaluation conducted on these robots aims to iden- common to both robots.
tify vulnerabilities that may be present in the devices and
could be extrapolated to other robotic platforms. The fol-
lowing will demonstrate how both robots share common
Table 2
Vulnerabilities of the evaluated robots
 Vulnerability                                                    Impact      Robot
 Lack of protection against brute force attacks in SSH protocol   High        Unitree A1
                                                                              Pepper
 Lack of verification against MiTM attack                         High        Unitree A1
                                                                              Pepper
 Denial of service to the robot’s Web server                      Moderate    Unitree A1
                                                                              Pepper
 Unsecured physical ports                                         High        Unitree A1
 Web server without authentication                                Moderate    Unitree A1
 API access without authentication                                High        Pepper
 Communication with the web server without encryption             Moderate    Pepper



4.1.1. Lack of protection against brute force
       attacks in SSH protocol
One way to access the embedded computers inside the
robot is through the SSH protocol. This connection al-
lows for configuring certain aspects of the robot, such
as the AP password, and even controlling the robot us-
ing the installed SDK. Both the Unitree A1 robot and
Pepper do not implement security measures to prevent          Figure 3: On the left, view of the teleoperator after being
brute-force attacks on the SSH servers installed in the       attacked. On the right, real image of the robot’s situation.
robot. To verify that the SSH servers are vulnerable to
dictionary attacks or brute-force attacks, the open-source
tool Hydra has been used [16].
   If an attacker gains access to the robot’s internal com-  actual situation, potentially enabling an attacker to cause
puters, they could potentially control the robot remotely    harm to the robot itself or its surrounding environment.
and even delete system files, rendering the device inop-        To exploit this vulnerability, an ARP Spoofing attack
erable. Furthermore, since the default password for both     was conducted using the "arpspoof" tool [17]. This at-
devices is considered insecure today and is present in       tack is considered one of the most dangerous on LAN
a wide range of online dictionaries, this vulnerability is   networks [18]. The attacker manipulates both the robot’s
deemed severe with a score of 9 and the following CVSS       and the victim’s ARP tables, associating their MAC ad-
vector: AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H.                 dress with the victim’s IP address, thereby redirecting
                                                             all traffic to a machine controlled by the attacker. Subse-
                                                             quently, the attacker redirects the traffic arriving from
4.1.2. Lack of verification against MiTM attack
                                                             the user to a web server identical to the robot’s but un-
Neither the quadruped robot Unitree A1 nor the social der the attacker’s control. In this case, the web server
robot Pepper implement security measures to prevent deployed by the Unitree is MJPG-Streamer, which is pub-
an attacker with access to the robot’s network from per- licly available on GitHub [19].
forming a Man-in-the-Middle (MitM) attack. This would           The consequences of such attacks can be critical in
allow the attacker to intercept unencrypted communica- certain environments. For instance, in Figure 3, can see
tions and manipulate them at will. Here’s an example of that the person operating the robot perceives an obstacle-
the vulnerability in the Unitree A1 robot: The A1 robot free corridor, while in reality, the robot is in a hazardous
deploys a web server that serves images from the robot’s situation near a set of stairs.
camera, allowing an operator to teleoperate the device          This vulnerability has a high impact with a score
remotely.                                                    of 8.0 and the following associated CVSSv3 vector:
   An attacker who has access to the network deployed by AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. A video has
the robot can carry out a MitM attack, altering the video been created to replicate the experiment performed [20].
transmission from the robot’s camera with another feed
controlled by the attacker, without the victim noticing 4.1.3. Denial of service to the robot’s Web server
any difference. If the robot is used in critical situations,
the operator controlling the robot will not perceive the The web servers deployed by both robots are vulnerable
                                                             to denial-of-service (DoS) attacks. The process to exe-
                                                               simply by plugging them in. These devices are referred to
                                                               as Rubber Ducky [21]. Furthermore, the exposure of USB
                                                               ports also makes the robot vulnerable to attacks carried
                                                               out with a USB killer device [22]. This type of device dis-
                                                               charges a high-voltage surge, damaging the components
                                                               of the connected device. This vulnerability has a high
                                                               impact with a score of 7.5, and the associated CVSSv3
                                                               vector is AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L.

                                                               4.2.2. Web server without authentication
                                                               Access to the live video feed from the robot’s camera
                                                               does not have an authentication system. Therefore, any
                                                               user connected to the network emitted by the robot can
                                                               view the real-time image either through the device’s web
                                                               server or via the mobile application. To be considered
                                                               secure, this functionality should require authentication.
                                                                  This vulnerability has a moderate impact with
                                                               a score of 5.7 and the following CVSSv3 vector:
                                                               AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N.

                                                               4.3. Pepper robot vulnerabilities
                                                               In this section, the vulnerabilities that exclusively affect
                                                               the social robot Pepper are presented.
Figure 4: Top view of Unitree A1.
                                                               4.3.1. API access without authentication
                                                               The API implemented by Pepper allows for complete
cute this attack is quite similar to the previous one, as it   control of the device. Access to the API occurs without
relies on the ARP Spoofing technique in both cases. To         any form of authentication, so an attacker only needs
exploit this vulnerability, the attacker must manipulate       to be on the same network as the robot. Interaction
the victim’s and robot’s ARP tables to intercept traffic.      with the API is done through port 9559 using the Python
Once the attack is successfully carried out, all packets       programming language, although C++ and Java are also
are received by the attacker, who will then discard these      supported.
packets, causing the legitimate user to lose the connec-         This vulnerability has a high impact with a
tion to the web server. This vulnerability has a moderate      score of 7.5, and the associated CVSSv3 vector is:
impact with a score of 5.7 and the following associated        AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSSv3 vector: AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H.
                                                               4.3.2. Communication with the web server
4.2. Unitree A1 robot vulnerabilities                                 without encryption
This section shows vulnerabilities that exclusively affect     The web server used by the robot utilizes unencrypted
the Unitree A1 robot.                                          HTTP communication. An attacker connected to the net-
                                                               work can sniff the traffic and obtain the access credentials
4.2.1. Unsecured physical ports                                for the web server, as depicted in Figure 5.
                                                                  This vulnerability has a moderate impact with
Figure 4 shows the port distribution of the robot. The
                                                               a score of 6.5 and the following CVSSv3 vector:
main vulnerability lies in the fact that the robot does
                                                               AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N.
not request any form of authentication when connected
through the provided ports.
   The lack of authentication poses several security im- 5. Conclusions
plications, even without connecting standard input and
output devices such as a keyboard and monitor. Cur- The use of robotics is becoming increasingly widespread;
rently, there are USB-like devices that function as input however, it is essential that progress in this field is accom-
and output devices, enabling the execution of commands
Figure 5: Capture of Pepper’s traffic showing the robot’s plaintext credentials.



panied by a thorough review of potential vulnerabilities ropean Union NextGenerationEU/PRTR.
in these devices.
    In this work, a security evaluation has been conducted
on the quadruped robot Unitree A1 and the service robot References
Pepper. Several potential vulnerabilities have been iden-
                                                            [1] A. E. de Robótica y Automatización, La impor-
tified that could be exploited by an attacker to gain unau-
                                                                tancia de la ciberseguridad en la industria 4.0,
thorized access to the robot or control its movements and
                                                                https://www.aer-automation.com/wp-content/
actions. For each of the vulnerabilities discovered in this
                                                                uploads/2023/01/Ciberseguridad_AERPaper.pdf,
work, a Common Vulnerabilities and Exposures (CVE)
                                                                2023.
has been requested. The CVE program’s mission is to
                                                            [2] K. Geldenhuys, Killer robots are real, Servamus
identify, define, and catalog publicly disclosed cyberse-
                                                                Community-based Safety and Security Magazine
curity vulnerabilities.
                                                                116 (2023) 20–22.
    To continue advancing in the field of robotics, it is
                                                            [3] G. W. Clark, M. V. Doran, T. R. Andel, Cybersecurity
necessary to implement security measures such as user
                                                                issues in robotics, in: 2017 IEEE conference on
authentication and authorization, encryption of device
                                                                cognitive and computational aspects of situation
communications, and regular security testing to detect
                                                                management (CogSIMA), IEEE, 2017, pp. 1–5.
and address potential vulnerabilities in the software of
                                                            [4] R. Singh, T. Bera, Walking model of jansen
various robotic platforms. It is important to emphasize
                                                                mechanism-based quadruped robot and application
that the cybersecurity of quadruped and social robots is
                                                                to obstacle avoidance, Arabian Journal for Science
a critical issue that must be addressed by manufacturers,
                                                                and Engineering 45 (2020) 653–664.
developers, and users of these devices to ensure their
                                                            [5] Y. H. Lee, Y. H. Lee, H. Lee, L. T. Phan, H. Kang,
proper functioning and protect them against potential
                                                                U. Kim, J. Jeon, H. R. Choi, Trajectory design and
malicious attacks that could pose a security risk to the
                                                                control of quadruped robot for trotting over obsta-
robot itself or to people in its vicinity.
                                                                cles, in: 2017 IEEE/RSJ International Conference on
                                                                Intelligent Robots and Systems (IROS), IEEE, 2017,
Acknowledgment                                                  pp. 4897–4902.
                                                            [6] C. Cerrudo, L. Apa, Hacking robots before skynet,
This research has been partially supported un-                  IOActive Website (2017) 1–17.
der the grant PID2021-126592OB-C21 funded                   [7] S.-Y. Jeong, I.-J. Choi, Y.-J. Kim, Y.-M. Shin, J.-H.
by      MCIN/AEI/10.13039/501100011033           and    by      Han, G.-H. Jung, K.-G. Kim, A study on ros vulnera-
ERDF A way of making Europe and under                           bilities and countermeasure, in: Proceedings of the
the Grant TED2021-132356B-I00 funded by                         Companion of the 2017 ACM/IEEE International
MCIN/AEI/10.13039/501100011033 and by the "Eu-
     Conference on Human-Robot Interaction, 2017, pp.
     147–148.
 [8] R. White, D. H. I. Christensen, D. M. Quigley,
     Sros: Securing ros over the wire, in the graph, and
     through the kernel, arXiv preprint arXiv:1611.07060
     (2016).
 [9] A. Giaretta, M. De Donno, N. Dragoni, Adding
     salt to pepper: A structured security assessment
     over a humanoid robot, in: Proceedings of the 13th
     International Conference on Availability, Reliability
     and Security, 2018, pp. 1–8.
[10] U. Robotics, Unitree, https://m.unitree.com/, 2022.
[11] U. Robotics,          Unitree a1 user manual,
     https://www.mybotshop.de/Datasheet/
     UnitreeA1_User_Manual_v1.0.pdf/, 2020.
[12] F. L. Siena, B. Byrom, P. Watts, P. Breedon, Utilising
     the intel realsense camera for measuring health
     outcomes in clinical research, Journal of medical
     systems 42 (2018) 1–10.
[13] J. Bayer, J. Faigl, On autonomous spatial exploration
     with small hexapod walking robot using tracking
     camera intel realsense t265, in: 2019 European
     Conference on Mobile Robots (ECMR), IEEE, 2019,
     pp. 1–6.
[14] J. Hu, Y. Niu, Z. Wang, Obstacle avoidance methods
     for rotor uavs using realsense camera, in: 2017
     Chinese Automation Congress (CAC), IEEE, 2017,
     pp. 7151–7155.
[15] INCIBE, Métricas de evaluación de vulnerabilidades:
     Cvss 3.0, https://.incibe-cert.es/blog/cvss3-0/, 2023.
[16] V.      Hauser,       Hydra,     https://github.com/
     vanhauser-thc/thc-hydra/, 2022.
[17] D. Song, arpspoof - intercept packets on a switched
     lan,     https://manpages.ubuntu.com/manpages/
     bionic/man8/arpspoof.8.html, 2022.
[18] G. Jinhua, X. Kejian, Arp spoofing detection algo-
     rithm using icmp protocol, in: 2013 International
     Conference on Computer Communication and In-
     formatics, IEEE, 2013, pp. 1–6.
[19] jacksonliam, Servidor web mjpg-streamer, https:
     //github.com/jacksonliam/, 2021.
[20] A. Miguel, Ataque man in the middle al unitree a1,
     https://bit.ly/3JGCGDl, 2023.
[21] INCIBE, Rubber ducky, ¿una simple memo-
     ria usb?, https://www.incibe.es/empresas/blog/
     rubber-ducky-simple-memoria-usb, 2023.
[22] O. Angelopoulou, S. Pourmoafi, A. Jones, G. Sharma,
     Killing your device via your usb port, in: Proceed-
     ings of the Thirteenth International Symposium on
     Human Aspects of Information Security & Assur-
     ance (HAISA 2019), The Centre for Security, Com-
     munications and Network Research (CSCAN), 2019,
     pp. 61–72.