On the (In)Security of Secure ROS2

ROS2 Modeling