Visible to the public Automated Vulnerability Analysis Technique for Smart Grid Infrastructure

TitleAutomated Vulnerability Analysis Technique for Smart Grid Infrastructure
Publication TypeConference Paper
Year of Publication2017
AuthorsKwon, Y., Kim, H. K., Koumadi, K. M., Lim, Y. H., Lim, J. I.
Conference Name2017 IEEE Power Energy Society Innovative Smart Grid Technologies Conference (ISGT)
ISBN Number978-1-5386-2890-4
Keywordsautomated power electricity network, automated vulnerability analysis, composability, compositionality, Computer architecture, Computer bugs, cyber-physical system, cyber-physical system security, Embedded Software, embedded software vulnerability discovery, general systems, Korean smart grid environment, Metrics, power electricity infrastructure, power engineering computing, power grid system, power grid vulnerability analysis, Power system protection, pubcrawl, resilience, Resiliency, security, security of data, security vulnerability analysis, Smart grid, smart grid infrastructure, Smart grids, smart meters, smart power grids, static analysis, vulnerability analysis, vulnerability analysis methodologies, vulnerability discovery method
Abstract

A smart grid is a fully automated power electricity network, which operates, protects and controls all its physical environments of power electricity infrastructure being able to supply energy in an efficient and reliable way. As the importance of cyber-physical system (CPS) security is growing, various vulnerability analysis methodologies for general systems have been suggested, whereas there has been few practical research targeting the smart grid infrastructure. In this paper, we highlight the significance of security vulnerability analysis in the smart grid environment. Then we introduce various automated vulnerability analysis techniques from executable files. In our approach, we propose a novel binary-based vulnerability discovery method for AMI and EV charging system to automatically extract security-related features from the embedded software. Finally, we present the test result of vulnerability discovery applied for AMI and EV charging system in Korean smart grid environment.

URLhttps://ieeexplore.ieee.org/document/8085965/
DOI10.1109/ISGT.2017.8085965
Citation Keykwon_automated_2017