Stay connected

Trending News

The digitization and decentralization of the electric power grid are key thrusts for an economically and environmentally sustainable future.
DER, White Papers

Distributed Energy Resources Cybersecurity Outlook:Vulnerabilities, Attacks, Impacts, and Mitigations 

Abstract—The digitization and decentralization of the electric power grid are key thrusts for an economically and environmentally sustainable future. Towards this goal, distributed energy resources (DER), including rooftop solar panels, battery storage, electric vehicles, etc., are becoming ubiquitous in power systems. Power utilities benefit from…

(DER) as “any grid-connected energy storage and generation technologies and their associated flexible loads”
DER, White Papers

POWER OUT? 

SOLARINVERTERS AND THESILENT CYBER THREAT What’s the problem? As Australia accelerates adoption of renewable energy sources, new cyber securityvulnerabilities are being introduced through Internet of Things (IoT) devices. Cyber securityconcerns about these devices, notably photovoltaic inverters (solar inverters), have recentlycome to the fore, and policy…

This paper will walk you through the proof-of-concept and technical details of exploitation for IOActive’s recent NFC relay attack on the newest Tesla vehicle, the Model Y.
White Papers

NFC RELAY ATTACK ON TESLA MODEL Y 

This paper will walk you through the proof-of-concept and technical details of exploitation forIOActive’s recent NFC relay attack on the newest Tesla vehicle, the Model Y.To successfully carry out the attack, IOActive reverse-engineered the NFC protocol Tesla usesbetween the NFC card and the vehicle, and…

Passive SSH Key
White Papers

Passive SSH Key Compromise via Lattices 

ABSTRACTWe demonstrate that a passive network attacker can opportunistically obtain private RSA host keys from an SSH server that experiences a naturally arising fault during signature computation. In prior work, this was not believed to be possible for the SSH protocol because the signature included…

Marvin attack
White Papers

Everlasting ROBOT: the Marvin Attack 

Abstract. In this paper we show that Bleichenbacher-style attacks onRSA decryption are not only still possible, but also that vulnerable implementations are common. We have successfully attacked multiple implementations using only timing of decryption operation and shown thatmany others are vulnerable. To perform the attack…