Sept. 22, 2022, 1:20 a.m. | Ryan Shah, Chuadhry Mujeeb Ahmed, Shishir Nagaraja

cs.CR updates on arXiv.org arxiv.org

Connected robots play a key role in Industry 4.0, providing automation and
higher efficiency for many industrial workflows. Unfortunately, these robots
can leak sensitive information regarding these operational workflows to remote
adversaries. While there exists mandates for the use of end-to-end encryption
for data transmission in such settings, it is entirely possible for passive
adversaries to fingerprint and reconstruct entire workflows being carried out
-- establishing an understanding of how facilities operate. In this paper, we
investigate whether a remote …

encrypted end end-to-end operations robot

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

SOC Cyber Threat Intelligence Expert

@ Amexio | Luxembourg, Luxembourg, Luxembourg

Systems Engineer - SecOps

@ Fortinet | Dubai, Dubai, United Arab Emirates

Ingénieur Cybersécurité Gouvernance des projets AMR H/F

@ ASSYSTEM | Lyon, France

Senior DevSecOps Consultant

@ Computacenter | Birmingham, GB, B37 7YS