A Diet of Poisoned Fruit - Designing Implants and OT Payloads for ICS Embedded Devices
WEareTROOPERS via YouTube
Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore the intricacies of designing implants and operational technology (OT) payloads for industrial control system (ICS) embedded devices in this comprehensive conference talk. Delve into the cyber-physical attack lifecycle, examining real-world examples and use cases. Gain insights into the discovery stage, attack design process, and damage stage techniques. Learn about PLC architecture, resource constraints, and implant communication methods. Understand IO manipulation, large suppression, and alarm relaxation tightening strategies. Conclude with a Q&A session to further expand your knowledge of ICS security vulnerabilities and attack methodologies.
Syllabus
Introduction
Agenda
Cyber Physical Attack Lifecycle
Examples
Discovery Stage
Use Case
Killing a Filter
Backwash
Attack Design
Implants
PLC Architecture
ResourceConstraints
Case Study
Damage Stage
IO Manipulation
Large Suppression
Alarm Relaxation Tightening
Implant Communication
Conclusion
Questions
Taught by
WEareTROOPERS