Posts Tagged ‘SMART METERS’

Smart Meter Worm Propagation Sim Videos

August 27, 2009 Leave a comment

As a follow up on his Blackhat presentation ioactive’s mike davis was kind enough posting a couple of youtube videos where he simulated the propagation of the Smart Meter Worm.

The Simulation features 22,000 node smart-meter worm propagation using GPS points gathered from geo-coded home addresses purchased from a bulk mailing list. The simulation takes into account radio range (.001 GPS degrees for this sim) RF drop-off over distance(signal strength) and RF noise as well as packet collisions (to quarter second resolution).

As he mentioned in a recent webcast the 3 simulations below show different propagation rates/speeds as they simulate meters with different radio ranges and different scenarios for the initial worm release location with respect to the rest of the smart meter population.

For instance Meters with longer radio ranges tend to have higher collision rates…etc, thus slower.

You Tube Links:

Video 1
Video 2
Video 3

Power Lines Can be Used to Steal Data

July 19, 2009 Leave a comment

A recently announced exploit is targeting the electrical grid , with no expensive pieces of equipment required, How to execute these attacks will be demonstrated at the Black Hat USA 2009 security conference in Las Vegas later this month by Andrea Barisani and Daniele Bianco, a pair of researchers for network security consultancy Inverse Path.

Stealing Keystrokes via Electrical Lines

Stealing Keystrokes via Electrical Lines

In the power-line exploit, the attacker grabs the keyboard signals that are generated by hitting keys. Because the data wire within the keyboard cable is unshielded, the signals leak into the ground wire in the cable, and from there into the ground wire of the electrical system feeding the computer. Bit streams generated by the keyboards that indicate what keys have been struck create voltage fluctuations in the grounds, they say.

The attack proved successful when tapping electric sockets located up to 15 meters from where the target computer was plugged in the researchers say.

“If our small research was able to accomplish acceptable results in a brief development time (approximately a week of work) and with cheap hardware,” they say. “Consider what a dedicated team or government agency can accomplish with more expensive equipment and effort,”

Comments: Applying the same technique Can a vulnerable Smart Meter be used to steal data from all the wired Computers in a house ?

Full Article HERE