Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Address behaviour vulnerabilities in the next generation of autonomous robots

As service and industrial robots enter our lives, new types of cybersecurity issues emerge that involve the manipulation of a robot’s behaviour. Now is the time to develop countermeasures.

This is a preview of subscription content

Access options

Buy article

Get time limited or full article access on ReadCube.

$32.00

All prices are NET prices.

Fig. 1: Examples of behaviour vulnerabilities exploited by non-expert attackers.

References

  1. 1.

    Ackerman, E. IEEE Spect. 6, 103 (2019).

    Google Scholar 

  2. 2.

    Joe, C. et al. In Proceedings of the 2020 ACM/IEEE International Conference on Human-Robot Interaction 211–220 (2020).

  3. 3.

    Brown, D. S. & Niekum, S. Proceedings of the AAAI Conference on Artificial Intelligence 33, 7749–7758 (2019).

    Article  Google Scholar 

  4. 4.

    Bogue, R. Ind. Rob. 41, 487–492 (2014).

    Article  Google Scholar 

  5. 5.

    Luckcuck, M., Farrell, M., Dennis, L. A., Dixon, C. & Fisher, M. ACM Comput. Surv. 52, 1–41 (2019).

    Article  Google Scholar 

  6. 6.

    Clark, G. W., Doran, M. V. & Andel, T. R. In 2017 IEEE conference on cognitive and computational aspects of situation management 1–5 (2017).

  7. 7.

    Murino, G., Armando, A. & Tacchella, A. 2019 11th International Conference on Cyber Conflict (CyCon) 900, 1–19 (2019).

    Google Scholar 

  8. 8.

    Gupta, R. Kurtz, Z. T., Scherer, S. & Smereka, J. M. Preprint at https://arxiv.org/abs/1809.03565 (2018).

  9. 9.

    Sánchez, C. et al. Form. Methods Syst. Des. 54, 279–335 (2019).

    Article  Google Scholar 

  10. 10.

    Koller, D. & Friedman, N. (MIT press, 2009).

  11. 11.

    Pang, G., van den Hengel, A., Shen, C. & Cao, L. In Proceedings of the 27th ACM SIGKDD international conference on knowledge discovery & data mining 1298–1308 (2021).

  12. 12.

    Ghallab, M., Nau, D. & Traverso, P. Artif. Intell. 208, 1–17 (2014).

    Article  Google Scholar 

  13. 13.

    Kaelbling, L. P. & Lozano-Pérez, T. Int. J. Rob. Res. 32, 1194–1227 (2013).

    Article  Google Scholar 

Download references

Author information

Affiliations

Authors

Corresponding author

Correspondence to Michele Colledanchise.

Ethics declarations

Competing interests

The author declares no competing interests.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Colledanchise, M. Address behaviour vulnerabilities in the next generation of autonomous robots. Nat Mach Intell 3, 927–928 (2021). https://doi.org/10.1038/s42256-021-00415-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1038/s42256-021-00415-x

Search

Quick links

Nature Briefing

Sign up for the Nature Briefing newsletter — what matters in science, free to your inbox daily.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing