机器人的不安全状态是在舞台上。有关于主要机器人脆弱性及其不利后果的新兴担忧。但是,机器人和网络安全域之间仍有相当大的差距。为了填补这种差距,目前的技术报告提供了机器人CTF(RCTF),一个在线游乐场,用于从任何浏览器中挑战机器人安全性。我们描述了RCTF的架构,并提供了9个方案,黑客可以挑战不同机器人设置的安全性。我们的工作使安全研究人员提供给a)本地复制虚拟机器人方案,b)将网络设置改为模拟真实机器人目标。我们倡导机器人中的黑客动力安全,并通过开放采购我们的场景贡献。
translated by 谷歌翻译
机器人在社会中取得了相关性,越来越越来越关注关键任务。尽管如此,机器人安全性被低估了。机器人安全性是一种复杂的景观,通常需要一个跨纪的横向落后的横向学科视角。要解决此问题,我们介绍了机器人安全框架(RSF),一种方法,用于在机器人中执行系统安全评估。我们提出,调整和开发特定术语,并提供了在四个主要层次(物理,网络,固件和应用程序)之后实现整体安全评估的指南。我们认为现代机器人应视为同样相关的内部和外部沟通安全。最后,我们倡导“通过默默无闻的安全”。我们得出结论,机器人中的安全领域值得进一步的研究努力。
translated by 谷歌翻译
ROS 2迅速成为机器人行业的标准。基于DDS作为其默认通信中间件并用于安全至关重要的场景中,将安全性添加到机器人和ROS计算图中越来越引起人们的关注。目前的工作介绍了SROS2,这是一系列开发人员工具和库,可促进ROS 2图添加安全性。为了关注SROS2中以可用性为中心的方法,我们提出了一种在遵循DevSecops模型时系统地保护图形的方法。我们还通过提出了一项应用程序案例研究来证明使用安全工具的使用,该案例研究考虑使用Puctor Navigation2和SLAM Toolbox Stacks在Turtlebot3机器人中应用的图形。我们分析了SROS2的当前功能,并讨论了这些缺点,从而为未来的贡献和扩展提供了见解。最终,我们将SROS2呈现为ROS 2的可用安全工具,并认为如果没有可用性,机器人技术的安全性将受到极大的损害。
translated by 谷歌翻译
机器人中的网络安全是一种新兴的主题,它已经获得了显着的牵引力。研究人员最近展示了网络攻击对机器人的一些潜力和影响。这意味着安全相关的不良后果导致人为的伤害,死亡或导致显着的诚信损失明确克服了古典IT世界的隐私问题。在网络安全研究中,使用漏洞数据库是一种非常可靠的工具,可负责揭示软件产品中的漏洞,并提高供应商的意愿来解决这些问题。在本文中,我们争辩说,现有的漏洞数据库的信息密度不足,并且在机器人中的漏洞中显示了一些偏见的内容。本文介绍了机器人漏洞数据库(RVD),该目录,用于机器人中的错误,弱点和漏洞的负责披露。本文旨在描述RVD后面的设计和过程以及相关的披露政策。此外,作者目前已经包含在RVD中的初步选择漏洞,并呼吁机器人和安全社区,以促进消除机器人中的零天漏洞的贡献。
translated by 谷歌翻译
机器人通常不会以安全为主要问题创建。对比典型IT系统,私人系统依赖于安全性来处理安全方面。鉴于前者,诸如常见漏洞评分系统(CVS)之类的经典评分方法无法准确捕获机器人漏洞的严重程度。目前的研究工作侧重于创建一个开放,自由地访问机器人漏洞评分系统(RVSS),该系统(RVSS)考虑机器人中的主要相关问题,包括a)机器人安全方面,b)对给定漏洞,c)图书馆和第三个漏洞的下游影响的评估-Party评分评估和D)环境变量,例如自漏洞泄露或网络上的曝光率。最后,提供了与CVSS对比的RVSS的实验评估,并侧重于专注于机器人安全景观。
translated by 谷歌翻译
机器人景观正在经历大变化。机器人正在蔓延,很快就会到处。传统上用于工业的系统正在被协作机器人所取代,而在人们的日常活动中介绍了越来越多的专业和消费机器人。机器人越来越多地与它的其他方面交织在一起,并设想以获得更多的自主权,与人类身体相互作用。我们声称,遵循个人计算机(PC)和智能手机,机器人是下一个技术革命,但制造商正在忽略机器人安全性。本文旨在警惕不仅有安全处理的需求,而是从即将到来的技术时代开始的机器人安全性。我们在此提供了一份评论机器人危险的文件,并分析了不面临这些问题的后果。我们强烈地提倡安全 - 首先是必须立即实施的安全方法。
translated by 谷歌翻译
In this paper, we propose a novel technique, namely INVALIDATOR, to automatically assess the correctness of APR-generated patches via semantic and syntactic reasoning. INVALIDATOR reasons about program semantic via program invariants while it also captures program syntax via language semantic learned from large code corpus using the pre-trained language model. Given a buggy program and the developer-patched program, INVALIDATOR infers likely invariants on both programs. Then, INVALIDATOR determines that a APR-generated patch overfits if: (1) it violates correct specifications or (2) maintains errors behaviors of the original buggy program. In case our approach fails to determine an overfitting patch based on invariants, INVALIDATOR utilizes a trained model from labeled patches to assess patch correctness based on program syntax. The benefit of INVALIDATOR is three-fold. First, INVALIDATOR is able to leverage both semantic and syntactic reasoning to enhance its discriminant capability. Second, INVALIDATOR does not require new test cases to be generated but instead only relies on the current test suite and uses invariant inference to generalize the behaviors of a program. Third, INVALIDATOR is fully automated. We have conducted our experiments on a dataset of 885 patches generated on real-world programs in Defects4J. Experiment results show that INVALIDATOR correctly classified 79% overfitting patches, accounting for 23% more overfitting patches being detected by the best baseline. INVALIDATOR also substantially outperforms the best baselines by 14% and 19% in terms of Accuracy and F-Measure, respectively.
translated by 谷歌翻译
The recent increase in public and academic interest in preserving biodiversity has led to the growth of the field of conservation technology. This field involves designing and constructing tools that utilize technology to aid in the conservation of wildlife. In this article, we will use case studies to demonstrate the importance of designing conservation tools with human-wildlife interaction in mind and provide a framework for creating successful tools. These case studies include a range of complexities, from simple cat collars to machine learning and game theory methodologies. Our goal is to introduce and inform current and future researchers in the field of conservation technology and provide references for educating the next generation of conservation technologists. Conservation technology not only has the potential to benefit biodiversity but also has broader impacts on fields such as sustainability and environmental protection. By using innovative technologies to address conservation challenges, we can find more effective and efficient solutions to protect and preserve our planet's resources.
translated by 谷歌翻译
Variational autoencoders model high-dimensional data by positing low-dimensional latent variables that are mapped through a flexible distribution parametrized by a neural network. Unfortunately, variational autoencoders often suffer from posterior collapse: the posterior of the latent variables is equal to its prior, rendering the variational autoencoder useless as a means to produce meaningful representations. Existing approaches to posterior collapse often attribute it to the use of neural networks or optimization issues due to variational approximation. In this paper, we consider posterior collapse as a problem of latent variable non-identifiability. We prove that the posterior collapses if and only if the latent variables are non-identifiable in the generative model. This fact implies that posterior collapse is not a phenomenon specific to the use of flexible distributions or approximate inference. Rather, it can occur in classical probabilistic models even with exact inference, which we also demonstrate. Based on these results, we propose a class of latent-identifiable variational autoencoders, deep generative models which enforce identifiability without sacrificing flexibility. This model class resolves the problem of latent variable non-identifiability by leveraging bijective Brenier maps and parameterizing them with input convex neural networks, without special variational inference objectives or optimization tricks. Across synthetic and real datasets, latent-identifiable variational autoencoders outperform existing methods in mitigating posterior collapse and providing meaningful representations of the data.
translated by 谷歌翻译
Cashews are grown by over 3 million smallholders in more than 40 countries worldwide as a principal source of income. As the third largest cashew producer in Africa, Benin has nearly 200,000 smallholder cashew growers contributing 15% of the country's national export earnings. However, a lack of information on where and how cashew trees grow across the country hinders decision-making that could support increased cashew production and poverty alleviation. By leveraging 2.4-m Planet Basemaps and 0.5-m aerial imagery, newly developed deep learning algorithms, and large-scale ground truth datasets, we successfully produced the first national map of cashew in Benin and characterized the expansion of cashew plantations between 2015 and 2021. In particular, we developed a SpatioTemporal Classification with Attention (STCA) model to map the distribution of cashew plantations, which can fully capture texture information from discriminative time steps during a growing season. We further developed a Clustering Augmented Self-supervised Temporal Classification (CASTC) model to distinguish high-density versus low-density cashew plantations by automatic feature extraction and optimized clustering. Results show that the STCA model has an overall accuracy of 80% and the CASTC model achieved an overall accuracy of 77.9%. We found that the cashew area in Benin has doubled from 2015 to 2021 with 60% of new plantation development coming from cropland or fallow land, while encroachment of cashew plantations into protected areas has increased by 70%. Only half of cashew plantations were high-density in 2021, suggesting high potential for intensification. Our study illustrates the power of combining high-resolution remote sensing imagery and state-of-the-art deep learning algorithms to better understand tree crops in the heterogeneous smallholder landscape.
translated by 谷歌翻译