Automated vulnerability detection for compiled smart grid software

S. J. Prowell, M. Pleszkoch, K. D. Sayre, R. C. Linger

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

Original languageEnglish
Title of host publication2012 IEEE PES Innovative Smart Grid Technologies, ISGT 2012
DOIs
StatePublished - 2012
Event2012 IEEE PES Innovative Smart Grid Technologies, ISGT 2012 - Washington, DC, United States
Duration: Jan 16 2012Jan 20 2012

Publication series

Name2012 IEEE PES Innovative Smart Grid Technologies, ISGT 2012

Conference

Conference2012 IEEE PES Innovative Smart Grid Technologies, ISGT 2012
Country/TerritoryUnited States
CityWashington, DC
Period01/16/1201/20/12

Keywords

  • Smart grids
  • formal verification
  • reasoning about programs
  • vulnerability detection

Fingerprint

Dive into the research topics of 'Automated vulnerability detection for compiled smart grid software'. Together they form a unique fingerprint.

Cite this