Alurity is a modular and composable toolbox for robot security. Featuring dozens of different tools, it simplifies and speeds up the cyber security research in robotics.Get now!
Alurity ensures that security researchers working in a project, have a common, consistent and easily reproducible development environment facilitating the security process (exploitation and mitigation) and the collaboration across teams. It's available for Linux (across distributions), Mac OS and Windows.
Alurity organizes tools in different groups that allow for easy composition and use.
Robots are the base modules of alurity. Each captures either a simulated robotic instance or its controller's file system enhanced with virtual networking interfaces, allowing to challenge its security without the need of having the robot in front of you.
Robot components are layers on top of base modules. They add robotic functionality and include robotic frameworks, communication middlewares, drivers, honeypots and more elements of the robotic ecosystem. Alurity simplifies its integration and facilitates the automation of security testing.
Forensics deals with scientific tests and methods to obtain, preserve and document evidence from robot-related crimes. In particular, it focuses on recovering data from robotic systems to establish who committed the crime. The tools below aid in this endeavor.
An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a vulnerability to cause unintended or unanticipated behavior to occur on a robot. Robot exploitation is the art of taking advantage of security flaws in robots and robot components. For research purposes, the tools below aid in this endeavor.
Testing in robot cyber security is the study of a given robot or a robot component to determine flaws and use them as basis for further security research. The following tools aid in such process:
Reconnaissance is the act of gathering preliminary data or intelligence on your target. The data is gathered in order to better plan for your attack. Reconnaissance can be performed actively (meaning that you are directly touching the target) or passively (meaning that your recon is being performed through an intermediary).
Environments to develop, visualize and simulate robots and robot components. Much needed tools for robot cyber security research.
Alurity allows to easily build robotic subjects of study simulating different networks (e.g. LANs, serial comms, VPNs, VLANs, VXLANs, etc) and protection mechanisms. It also allows you to build automated attackers and weaponize them with different tools and exploits, facilitating evidence generation and reproduction.
Install alurity CLI, download/edit your confuration YAML file, and start alurity to begin with your robot security research. Alurity toolbox will automatically construct your security environent and preserve it across runs. SIMPLIFY YOUR SECURITY RESEARCH NOW!
Alurity is configured using simple YAML files. Select the desired modules and start your security research.
An Academic license with group licenses. Meant for proven Educational Institutions or R&D centers. Provides limited access to the tools, the documentation, tutorials and the components for research and educational purposes.
Professional (per-user) license of alurity including full access to all available tools and components, documentation, customer support and requests for new modules.
Alurity is available for both professional users as well as for academic researchers and students.
It's compatible with Linux (across distributions), Mac OS and Windows and requires only a Docker CE installation.