Taxonomy of firmware Trojans in smart grid devices

Charalambos Konstantinou, Anastasis Keliris, Michail Maniatakos

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The modernization of the electric grid, utilizing advances in information technologies, has uncovered opportunities for improved communication and efficiency of power systems. While this smart grid environment offers significant economic and reliability benefits, it has also divulged a substantial range of cyber attack issues. Attacks on embedded microprocessor-based devices, like Stuxnet, have demonstrated that the firmware of control equipment can be susceptible to security breaches able to cause great damage to the system. Despite the numerous studies on power systems security, researchers do not have a representative set of benchmarks and taxonomy classes to be able to develop proper detection and mitigation strategies against such attacks. To this end, we provide a taxonomy for firmware Trojans and develop firmware Trojan benchmark cases for four devices commonly found in smart grid deployments.

Original languageEnglish (US)
Title of host publication2016 IEEE Power and Energy Society General Meeting, PESGM 2016
PublisherIEEE Computer Society
ISBN (Electronic)9781509041688
DOIs
StatePublished - Nov 10 2016
Event2016 IEEE Power and Energy Society General Meeting, PESGM 2016 - Boston, United States
Duration: Jul 17 2016Jul 21 2016

Publication series

NameIEEE Power and Energy Society General Meeting
Volume2016-November
ISSN (Print)1944-9925
ISSN (Electronic)1944-9933

Other

Other2016 IEEE Power and Energy Society General Meeting, PESGM 2016
CountryUnited States
CityBoston
Period7/17/167/21/16

ASJC Scopus subject areas

  • Energy Engineering and Power Technology
  • Nuclear Energy and Engineering
  • Renewable Energy, Sustainability and the Environment
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Taxonomy of firmware Trojans in smart grid devices'. Together they form a unique fingerprint.

Cite this