Vis enkel innførsel

dc.contributor.authorNygård, Arne Roar
dc.contributor.authorKatsikas, Sokratis
dc.date.accessioned2023-11-30T15:25:52Z
dc.date.available2023-11-30T15:25:52Z
dc.date.created2023-08-16T09:17:48Z
dc.date.issued2023
dc.identifier.citationInternational Conference on Security and Cryptography (SECRYPT). 2023, 610-616.en_US
dc.identifier.issn2184-7711
dc.identifier.urihttps://hdl.handle.net/11250/3105486
dc.description.abstractCyber-attacks on digital supply chains are rising, and Critical Infrastructures (CIs) such as the Smart Grid are prime targets. There is increasing evidence that vendors, service providers, and outsourced IT -providers are at equal risk of being used by malicious actors to gain a foothold in the power grid - delivering exploits that can disrupt electric power delivery and severely damage our economy. Long digital supply chains with components from different manufacturers require a new approach and methods to ensure the needed security in Critical Infrastructures. Hardware Reverse Engineering (HRE), commonly used for verifying the security of an embedded system, includes disassembling to analyse, test, and document the functionality and vulnerability of the target system. This paper proposes leveraging HRE for improving both the security and the resilience of the power infrastructure against cyber-attacks enabled through the digital supply chain, by organising HRE activities, and how this can be organized within the equipment procurement process in a Distribution System Operator (DSO).en_US
dc.language.isoengen_US
dc.publisherSciTePressen_US
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/deed.no*
dc.titleLeveraging Hardware Reverse Engineering to Improve the Cyber Security and Resilience of the Smart Grid.en_US
dc.title.alternativeLeveraging Hardware Reverse Engineering to Improve the Cyber Security and Resilience of the Smart Grid.en_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionpublishedVersionen_US
dc.source.pagenumber610-616en_US
dc.source.journalInternational Conference on Security and Cryptography (SECRYPT)en_US
dc.identifier.doi10.5220/0012046000003555 
dc.identifier.cristin2167244
dc.relation.projectNorges forskningsråd: 310105en_US
dc.relation.projectNorges forskningsråd: 320932en_US
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal