Myth or reality — Does the Aurora vulnerability pose a risk to my generator?

@article{Zeller2011MythOR,
  title={Myth or reality — Does the Aurora vulnerability pose a risk to my generator?},
  author={Mark Zeller},
  journal={2011 64th Annual Conference for Protective Relay Engineers},
  year={2011},
  pages={130-136}
}
  • Mark Zeller
  • Published 2011 in
    2011 64th Annual Conference for Protective Relay…
There have been many reports of cyberintrusions, hacking, unauthorized operations, and malicious attacks on the electric power system. Many of these reports are uncorroborated and strengthen the skepticism of the very people in position to prevent these invasions. One vulnerability that has drawn substantial discussion is the Aurora vulnerability, which focuses on electric power generators. Since the dramatic video and interview on the television news in 2007 showing how to cause severe damage… CONTINUE READING
Highly Cited
This paper has 68 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 35 extracted citations

Modeling Cyber-Physical Vulnerability of the Smart Grid With Incomplete Information

IEEE Transactions on Smart Grid • 2013
View 3 Excerpts
Highly Influenced

Defending Electrical Substations Against 0-Day Malware Through Decoy I/O in Protective Relays

2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech) • 2017
View 1 Excerpt

Effects of Cyber Coupling on Cascading Failures in Power Systems

IEEE Journal on Emerging and Selected Topics in Circuits and Systems • 2017

68 Citations

01020'13'15'17'19
Citations per Year
Semantic Scholar estimates that this publication has 68 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-8 of 8 references

Requirements or recommendations? Sorting out NERC CIP, NIST, and DOE cybersecurity

2011 64th Annual Conference for Protective Relay Engineers • 2011
View 2 Excerpts

Engineering Defense-in-Depth Cybersecurity for the Modern Substation,

C. Ewing
proceedings of the 12th Annual Western Power Delivery Automation Conference, • 2010
View 2 Excerpts

Implementing Firewalls for Modern Substation Cybersecurity,

D. Anderson, N. Kipp
proceedings of the 12th Annual Western Power Delivery Automation Conference, • 2010
View 2 Excerpts

Siemens Updates Response to Virus Attack,

G. Mintchell
Automation World Magazine, July • 2010
View 1 Excerpt

Donolo, “Mitigating the Aurora Vulnerability With Existing Technology,

D. Salmon, M. Zeller, A. Guzmán, V. Mynam
proceedings of the 36th Annual Western Protective Relay Conference, • 2009
View 1 Excerpt

Securing Modern Substations With an Open Standard Network Security Solution,

D. Anderson
proceedings of the 11th Annual Western Power Delivery Automation Conference, • 2009
View 2 Excerpts

Ten Tips for Improving the Security of Your Assets,

III E.O. Schweitzer
2009
View 1 Excerpt

Filtering for Protective Relays,

III E.O. Schweitzer, D. Hou
proceedings of the 47th Annual Georgia Tech Protective Relaying Conference, • 1993
View 1 Excerpt

Similar Papers

Loading similar papers…