In(security) of smart energy meters – A hardware security perspective | Sulthan Alaudeen | Webinar
nullcon nullcon
11.6K subscribers
2,566 views
40

 Published On Aug 10, 2020

About Webinar:
---------------------
Current Covid situation is showing us how the utilities are effectively using the remote monitoring of residential and Industrial power usage and avoiding direct human contact. These "smart" meters are becoming an essential part of our connected lives and also prone to different security vulnerabilities faced by similar connected embedded system. Advanced metering infrastructure (AMI) is an integrated system of smart meters, communications networks, and data management systems that enables two-way communication between utilities and customers.

The system provides a number of important functions such as the ability to automatically and remotely measure electricity use, connect and disconnect service, detect tampering, identify and isolate outages, and monitor voltage.

These "smart" meters are an interesting target for security researchers in analyzing the different security vulnerabilities that can affect the devices as well as the backend electric utilities and infrastructure. Whether an attacker can tamper consumption data in the smart energy meters to infiltrate the grid infrastructure is always question of an utility operators. These smart devices come from hundreds of different vendors with advanced to minimal features such power measurement, outages, events & alarm, tamper resistant and energy optimization. Also the negative 5G thing :)

The purpose of this session is to cover the different hardware security aspects of the smart meters and threats in smart meter device security. We will also cover the current hardware penetration testing methodology and different security standards associated with smart meter security.

About Speaker:
----------------------
Sulthan Alaudeen is a Hardware security researcher at Digital14 and specializes in assessing hardware security vulnerabilities and threats, reverse engineering and exploitation of test features. He has previously worked in power plant as a control systems engineer and also with Bosch and Honeywell in automotive and ICS security validation.

He has an Masters in Embedded systems from BITS Pilani, India and also holds an SANS GICSP.

Sulthan is passionate about advanced threats such fault and side channel analysis and fuzzing of communication protocols in embedded systems.
-----------------------------------------------------
#Hardware #Security #Nullcon
-----------------------------------------------------
Follow nullcon on Facebook:   / nullcon  
Twitter:   / nullcon  
LinkedIn:   / nullcon  
Website: https://nullcon.net
YouTube: https://www.youtube.com/user/nullcon?...

show more

Share/Embed