

Asura is a portable and scalable PCAP file analyzer for detecting anomaly packets using massive multithreading. Unfortunately, there have been few research efforts focusing on scalablility in analyzing very large PCAP file with reasonable computing resources. Recently, the inspection of huge traffic log is imposing a great burden on security analysts. His research interests include cybersecurity for SCADA systems, industrial controllers and embedded systems.īack to top Asura: A huge PCAP file analyzer for anomaly packets detection using massive multithreadingĢ0 minutes | Tool Ruo Ando Center for Cybersecurity Research and Development, National Institute of Informatics, Japan student at the University of Alabama in Huntsville. In 2017 Thiago won first place in CSAW, the world's largest student-run cybersecurity competition, with his innovative embedded security solution for OpenPLC.

The OpenPLC project has contributions from several universities and private companies, such as Johns Hopkins and FreeWave Technologies. OpenPLC is being used as a valuable tool for control system research and education. In 2014 he created OpenPLC, the world's first open source industrial controller. degree in electrical engineering from the"Pontifícia Universidade Católica" (PUC) in 2013.
#Mcafee endpoint security download rowan series#
Additionally, I will demonstrate two vulnerabilities I recently discovered, affecting the Rockwell MicroLogix 1400 series and the Schneider Modicon M221 controllers. There will be some live demonstration attacks against 3 different brands of PLCs (if the demo demons allow it, if not I will just show a video). During this presentation I will talk about the architecture of a PLC and how it can be p0wned. As a consequence, threats started pouring in and causing havoc. Although PLCs were made robust to sustain tough environments, little care was taken to raise defenses against potential cyber threats. Programmable Logic Controllers (PLCs) are devices used on a variety of industrial plants, from small factories to critical infrastructures like nuclear power plants, dams and wastewater systems. Student and Graduate Research Assistant at the University of Alabama in Huntsville Currently I work at the intersection of healthcare and the cloud, designing systems that make it harder for the adversary to operate.īack to top Hacking PLCs and Causing Havoc on Critical InfrastructuresĤ5 minutes | Demo, Exploit Thiago Alves Ph.D.

I'm a defender by trade, I work on understating the adversary then designing the mitigations based on what I've learned. I'm just a Security researcher who's always using tools in unintended ways.

In this talk I will detail how I was able to use online advertising to detect when a blue team is hot on my trail. When my implant gets discovered how will I know? Did the implant stop responding for some benign reason or is the IR team responding? With any luck they'll upload the sample somewhere public so I can find it, but what if I can find out if they start looking for specific bread crumbles in public data sources? At some point without any internal data all blue teams turn to OSINT which puts their searches within view of the advertising industry. Detecting Blue Team Research Through Targeted Ads
