Just in case you lacked the time to view the full S4x14 agenda, here are some highlights:
Learn About All Those DNP3 Vulns with Adam Crain and Chris Sistrunk
You’ve seen all the ICS-CERT bulletins regarding vulnerabilities in DNP3 protocol stacks. Hear from the two researchers how they constructed the fuzzing packets that caused the crashes, how they performed response and serial fuzzing, and what the vendors’ responses have been. I’m particularly interested in the fuzzing packets as it was different than edge cases or normal fuzzing techniques. It used information on the protocol and how it was used to cause the crashes.
Threat Characterization Using ICS Researchers As Examples with Bri Rolston
Bri has a session on threat characterization from the defender’s perspective. An important topic that will be made a lot more fun by using some of the more prolific ICS researchers as examples — most will be at S4x14.
PLCpwn with Stephen Hilt
The PowerPwn is a computer full of hacking tools that looks like a power strip. The 4G/GSM capability provides the attacker with his own comms channel to the ICS once the PowerPwn is deployed. This year I challenged Stephen to integrate similar capabilities into a popular PLC. Learn the cost, time to deploy and capabilities, and then think about what a well funded government might be doing.
Using Graph Theory To Contain Propagation of Malicious Code by Seth Bromberger
Remember the famous ioActive demonstration of propagation of malware in smart meters? It was an effective visual image. Seth takes an approach used in epidemiology and health sciences to contain the spread.
More S4x14 Session Highlights Tomorrow