Day 5: Hardware keys and replay attacks

Key exchange between the student’s program and the robot cannot happen in the open. We’ll show one way how the key can be securely transmitted from the robot. Finally, even with safely encrypted messages, replay attacks can still play havoc.

  • Replay attack. Even if the attacker cannot decode the messages it overhears, it can simply replay them confusing the robot. Students will do the Tug of War game with replay attacks this time.
  • Replay Attack Mitigation. Demonstration of a simple technique to prevent even replay attacks.    Video
  • Robust Self-Driving Program. An opportunity for the students to use a combination of the cybersecurity techniques learned in the previous two days to improve the original Self-Driving Program (from Tuesday).  The resulting program was utilized in the final race of the program.