Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Abusing CNC Technologies

Black Hat via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the security vulnerabilities of CNC machines in this 38-minute Black Hat conference talk. Delve into how the Industry 4.0 paradigm has transformed CNC machines into complex, software-dependent systems with increased connectivity, exposing them to potential threats. Examine the research approach used to identify problems such as program code leaks, firmware extraction vulnerabilities, and lack of resource access control. Discover how these vulnerabilities can lead to micro-defects, tool damage, manufacturing information theft, and software alarms. Learn about responsible disclosure practices and countermeasures to protect critical CNC assets in production plants globally.

Syllabus

Intro
CNC Machines
Industrial Revolution
A Complex Supply Chain
Research Approach
Example: Ethernet Q Commands
Identified Problems
Program Code Leak via MTConnect
Enabled Jumper allowed Firmware Extraction
Lack of Resource Access Control on Haas
A change of tool geometry...
causes micro-defects
Damaging a tool / part
Leaking Program Code
Hijacking a Parametric Program
Program Rewriting
Damaging a part
Theft of Manufacturing Information
Triggering Software Alarms
Responsible Disclosure
Countermeasures

Taught by

Black Hat

Reviews

Start your review of Abusing CNC Technologies

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.