Supply Chain Exploitation of Secure ROS 2 Systems: A Proof-of-Concept on Autonomous Platform Compromise via Keystore Exfiltration

📅 2025-10-31
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This study uncovers a critical supply-chain vulnerability in the Secure ROS 2 (SROS 2) framework: attackers can compromise official Debian packages to inject malicious logic and exfiltrate SROS 2 keystore credentials. We propose a novel DNS-tunneling–based key-segment exfiltration technique, integrating Base64 encoding with DDS message interception and injection to bypass authentication without triggering runtime alerts. Experimental evaluation demonstrates remote exploitation against autonomous vehicles, enabling forced braking, uncontrolled acceleration, and cyclic steering—while also falsifying or suppressing sensor data. In a four-way intersection navigation scenario, the attack achieves full system control. To our knowledge, this is the first systematic demonstration that supply-chain trust failures fundamentally undermine runtime security in DDS-based robotic systems. Our findings provide critical empirical evidence for strengthening SROS 2 security mechanisms and highlight the urgent need for supply-chain integrity assurance in safety-critical robotics.

Technology Category

Application Category

📝 Abstract
This paper presents a proof-of-concept supply chain attack against the Secure ROS 2 (SROS 2) framework, demonstrated on a Quanser QCar2 autonomous vehicle platform. A Trojan-infected Debian package modifies core ROS 2 security commands to exfiltrate newly generated keystore credentials via DNS in base64-encoded chunks to an attacker-controlled nameserver. Possession of these credentials enables the attacker to rejoin the SROS 2 network as an authenticated participant and publish spoofed control or perception messages without triggering authentication failures. We evaluate this capability on a secure ROS 2 Humble testbed configured for a four-stop-sign navigation routine using an Intel RealSense camera for perception. Experimental results show that control-topic injections can cause forced braking, sustained high-speed acceleration, and continuous turning loops, while perception-topic spoofing can induce phantom stop signs or suppress real detections. The attack generalizes to any data distribution service (DDS)-based robotic system using SROS 2, highlighting the need for both supply chain integrity controls and runtime semantic validation to safeguard autonomous systems against insider and impersonation threats.
Problem

Research questions and friction points this paper is trying to address.

Demonstrates supply chain attack compromising secure ROS 2 autonomous systems
Shows credential theft enables spoofed control and perception messages
Highlights need for integrity controls in robotic systems security
Innovation

Methods, ideas, or system contributions that make the work stand out.

Trojan-infected package modifies ROS 2 security commands
Exfiltrates keystore credentials via DNS to attacker server
Enables authenticated spoofing of control and perception messages
🔎 Similar Papers
No similar papers found.
T
Tahmid Hasan Sakib
Department of Electrical and Computer Engineering, Tennessee Technological University, Cookeville, TN, USA
Y
Yago Romano Martinez
Department of Computer Science, Tennessee Technological University, Cookeville, TN, USA
C
Carter Brady
Department of Electrical and Computer Engineering, Tennessee Technological University, Cookeville, TN, USA
Syed Rafay Hasan
Syed Rafay Hasan
Professor, Tennessee Technological University
Hardware securityDeep learningInternet of ThingsEdge Intelligence
Terry N. Guo
Terry N. Guo
Tennessee Technological University
wireless commdata & information sciencespectrum sharingRF sensingCPS security