2016 17th Latin-American Test Symposium (LATS) 2016
DOI: 10.1109/latw.2016.7483348
|View full text |Cite
|
Sign up to set email alerts
|

Attacking the smart grid using public information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3
3

Relationship

4
5

Authors

Journals

citations
Cited by 19 publications
(16 citation statements)
references
References 3 publications
0
13
0
Order By: Relevance
“…They present probabilistic power flow studies that show how the variable nature of power flow, due to wind fluctuations and uncertainties, can alter the number and location of the most critical contingencies recognized by system operators. The correct identification of these critical contingencies is of paramount importance as they can be potentially leveraged by adversaries in order to cause major disruptions in EPS [26], [27].…”
Section: ) Methods For N − K Contingency Analysismentioning
confidence: 99%
“…They present probabilistic power flow studies that show how the variable nature of power flow, due to wind fluctuations and uncertainties, can alter the number and location of the most critical contingencies recognized by system operators. The correct identification of these critical contingencies is of paramount importance as they can be potentially leveraged by adversaries in order to cause major disruptions in EPS [26], [27].…”
Section: ) Methods For N − K Contingency Analysismentioning
confidence: 99%
“…For instance, sticky valves, changes in chemical reaction kinetics, and random variations in the composition of input streams. Each disturbance has a unique numeric identifier in the range [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20]. Finally, there are process operating constraints (e.g., maximum reactor temperature, maximum reactor pressure, etc.)…”
Section: Tennessee Eastman Plantmentioning
confidence: 99%
“…Table 1 summarizes the state-of-the-art process-aware attacks and countermeasures for various ICS sectors. While there are many sector-specific attacks for Energy [19,23,29], Water [1,2,17,25,31,35], and Chemical [8,22,26,46] sectors, research on generic payload generation [17,32,33] is the closest to our work. We differ from ladder logic, bombs [17] in the impact of our attack vector: We cause specific sustainable manipulations whereas it focuses on random manipulations.…”
Section: Related Workmentioning
confidence: 99%
“…These characteristics require complete reconnaissance of the target. While public information about plants [23], device fingerprinting [14], social engineering [4] and model simulation [22] may be used to gain pre-infection knowledge, this leads to crafting manually designed target-specific attack vectors. We, on the other hand, aim to build attack tools that can automatically gain knowledge about the plant and can design payloads accordingly.…”
Section: Threat Modelmentioning
confidence: 99%