Following BlackHat 2009 in July, the archived webcast below highlights critical research Mike Davis and other IOActive researchers performed on Smart Grid technology.
- Smart Grid Device Security - Mike Davis, IOActive 8/27 - 4-5 pm CST
- References several video simulations of 22,000 node smart-meter worm propagation using GPS points gathered from geo-coded home addresses purchased from a bulk mailing list. Radio range and other factors are reflected once a compromised "Patient 0" meter is introduced. - Video 1, Video 2, Video 3
- BrighTALK.com registration required.
Davis and other IOActive researchers developed a proof-of-concept malicious code that self-propagated in a peer-to-peer fashion from one meter to the next as part of their effort to identify Smart Grid cyber security risks and threats. Webcast also addresses this attack simulation and discovered Smart Grid vulnerabilities to attack- such as susceptibilities to buffer overflows and root kits.
As one of the top Black Hat conference presentations, this has stirred up further attention to Smart Grid cyber security just as NIST is working to stand up and plow through developing related requirements and standards on an accelerated schedule. For those that missed out on the Blank Hat session, this recap is very informative.
Update 8-20-2009
Davis's Recoverable Advanced Metering Infrastructure presentation slides (23 pages, some thoughtful redactions) are now posted in the Black Hat USA 2009 Archive area.
No comments:
Post a Comment