Owner of the document requires that the content be not remodified or redistributed.
Share |



Securing the Smart Grid - "To Act Without Delay"
Author:
IOActive
Year:
2010
Abstract:

This presentation, given by IOActive, addresses security threats in smart grid technologies. It identifies both existing and potential risks. Smart meters are very important part of smart grid. Smart meter has design challenges, such as, unprotected communication protocols, unencrypted storage of encryption key and external storage, too. Hence, it's susceptible to various types of attacks, such as, message spoofing, man-in-the-middle, disconnect/reconnect command injection, etc. The presentation also brings into notice several hardware and software challenges innate in smart meters. IOA presented how they reverse engineered smart meters, remotely compromised it, and attacked HAN. They even created and spread worm in a simulated environment and showed how some hacker can make things unstable. The presentation ends with suggested remediation of this vulnerability in smart grid infrastructure.

Document Type:
Slide presentation
Source:
IOActive