There is a continuous evolving gap between SCADA/ICS attackers and the defenders. Once unauthorized access is gained to a control network or a piece of industrial equipment, an attack still needs to be performed. This is where the public literature falls short. This talk will discuss data integrity attacks in industrial sector through the eyes of the attacker.
by Marina Krotofil and Chris Sistrunk
Full Abstract: https://www.blackhat.com/asia-17/brie...