Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced SCADA hacking techniques in this 47-minute Black Hat conference talk by Jason Larsen. Delve into the challenges of post-intrusion attacks on industrial control systems, focusing on miniaturization techniques for hiding malicious code in PLCs and even pressure sensors. Learn about novel algorithms for spoofing processes, estimating physical states from noisy sensor signals, and extracting critical constants for attacks. Examine a real-world example of setting up an optimal pressure transient in chemical piping systems, and discover innovative approaches such as runs analysis for sensor noise simulation, 3D graphics-derived artifact extraction, and scale-free geometry matching for processing attack parameters. Gain insights into the complexities of SCADA security beyond initial network penetration and understand the potential for sophisticated attacks on industrial processes.