Day 5: Hardware keys and replay attacks

Key exchange between the student’s program and the robot cannot happen in the open. We’ll show one way how the key can be securely transmitted from the robot. Finally, even with safely encrypted messages, replay attacks can still play havoc.

  • Replay attack. Even if the attacker cannot decode the messages it overhears, it can simply replay them confusing the robot. Students will do the Tug of War game with replay attacks this time.
  • Replay Attack Mitigation. Demonstration of a simple technique to prevent even replay attacks.    Video
  • Robust Self-Driving Program. An opportunity for the students to use a combination of the cybersecurity techniques learned in the previous two days to improve the original Self-Driving Program (from Tuesday).  The resulting program was utilized in the final race of the program.
Feedback
Feedback
If you experience a bug or would like to see an addition or change on the current page, feel free to leave us a message.
Image CAPTCHA
Enter the characters shown in the image.
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.