Professor Avishai Wool of the School of Electrical Engineering at Tel Aviv University<\/figcaption><\/figure>\nAll this allowed them to load the controller malware despite the cryptographic security inherent in the systems. According to Prof. Biham, “this was a complex challenge because of the improvements that Siemens introduced in newer versions of Simatic controllers. Our success is linked to our vast experience in the study of controllers and their security and in combination with our in-depth knowledge in several areas \u2013 systems understanding, reverse engineering capabilities, communications protocol analysis, and cryptographic analysis.\u201d<\/span><\/p>\n
Dr. Bitan noted that the attack underscores the need for investment by both manufacturers and customers in securing industrial control systems. According to her, the attack shows that securing industrial control systems is a more difficult and challenging task than securing information systems.<\/span><\/p>\n
Mr. Malin and Dr. Bitan will present the research at the prestigious Black Hat Hacking Conference in Las Vegas from 11:00\u201311:50 a.m. on Thursday, August 8.<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"
Researchers from the Technion and Tel Aviv University succeeded in gaining control of one of the world’s most secure industrial programmable logic controller (PLC) As part of the attack, the researchers managed to turn the controller on and off, download rogue command logic, and change the operating and source codes. Moreover, they succeeded in creating… Continue Reading Hacking for Future Security<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24],"tags":[],"class_list":["post-84509","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"\nHacking for Future Security - \u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.technion.ac.il\/en\/blog\/hacking-for-future-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacking for Future Security - \u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc\" \/>\n<meta property=\"og:description\" content=\"Researchers from the Technion and Tel Aviv University succeeded in gaining control of one of the world’s most secure industrial programmable logic controller (PLC) As part of the attack, the researchers managed to turn the controller on and off, download rogue command logic, and change the operating and source codes. Moreover, they succeeded in creating… Continue Reading Hacking for Future Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.technion.ac.il\/en\/blog\/hacking-for-future-security\/\" \/>\n<meta property=\"og:site_name\" content=\"\u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-08T04:19:28+00:00\" \/>\n<meta name=\"author\" content=\"shlomi ben-oz\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"shlomi ben-oz\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.technion.ac.il\/en\/blog\/hacking-for-future-security\/\",\"url\":\"https:\/\/www.technion.ac.il\/en\/blog\/hacking-for-future-security\/\",\"name\":\"Hacking for Future Security - \u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc\",\"isPartOf\":{\"@id\":\"https:\/\/www.technion.ac.il\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.technion.ac.il\/en\/blog\/hacking-for-future-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.technion.ac.il\/en\/blog\/hacking-for-future-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.technion.ac.il\/wp-content\/uploads\/2019\/08\/BH-300x259.jpg\",\"datePublished\":\"2019-08-08T04:19:28+00:00\",\"author\":{\"@id\":\"https:\/\/www.technion.ac.il\/en\/#\/schema\/person\/d65b78b7a7446bdf9fb69078573b8320\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.technion.ac.il\/en\/blog\/hacking-for-future-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.technion.ac.il\/en\/blog\/hacking-for-future-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.technion.ac.il\/en\/blog\/hacking-for-future-security\/#primaryimage\",\"url\":\"https:\/\/www.technion.ac.il\/wp-content\/uploads\/2019\/08\/BH-300x259.jpg\",\"contentUrl\":\"https:\/\/www.technion.ac.il\/wp-content\/uploads\/2019\/08\/BH-300x259.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.technion.ac.il\/en\/blog\/hacking-for-future-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home Page\",\"item\":\"https:\/\/www.technion.ac.il\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hacking for Future Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.technion.ac.il\/en\/#website\",\"url\":\"https:\/\/www.technion.ac.il\/en\/\",\"name\":\"\u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.technion.ac.il\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.technion.ac.il\/en\/#\/schema\/person\/d65b78b7a7446bdf9fb69078573b8320\",\"name\":\"shlomi ben-oz\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.technion.ac.il\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5b97bb3947cb26db7c002c11fa0f50454ced53af5f27e730cc60fec87ae78347?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5b97bb3947cb26db7c002c11fa0f50454ced53af5f27e730cc60fec87ae78347?s=96&d=mm&r=g\",\"caption\":\"shlomi ben-oz\"},\"url\":\"https:\/\/www.technion.ac.il\/en\/blog\/author\/ben-ozshlomitechnion-ac-il\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacking for Future Security - \u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.technion.ac.il\/en\/blog\/hacking-for-future-security\/","og_locale":"en_US","og_type":"article","og_title":"Hacking for Future Security - \u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc","og_description":"Researchers from the Technion and Tel Aviv University succeeded in gaining control of one of the world’s most secure industrial programmable logic controller (PLC) As part of the attack, the researchers managed to turn the controller on and off, download rogue command logic, and change the operating and source codes. Moreover, they succeeded in creating… Continue Reading Hacking for Future Security","og_url":"https:\/\/www.technion.ac.il\/en\/blog\/hacking-for-future-security\/","og_site_name":"\u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc","article_published_time":"2019-08-08T04:19:28+00:00","author":"shlomi ben-oz","twitter_card":"summary_large_image","twitter_misc":{"Written by":"shlomi ben-oz","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.technion.ac.il\/en\/blog\/hacking-for-future-security\/","url":"https:\/\/www.technion.ac.il\/en\/blog\/hacking-for-future-security\/","name":"Hacking for Future Security - \u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc","isPartOf":{"@id":"https:\/\/www.technion.ac.il\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.technion.ac.il\/en\/blog\/hacking-for-future-security\/#primaryimage"},"image":{"@id":"https:\/\/www.technion.ac.il\/en\/blog\/hacking-for-future-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.technion.ac.il\/wp-content\/uploads\/2019\/08\/BH-300x259.jpg","datePublished":"2019-08-08T04:19:28+00:00","author":{"@id":"https:\/\/www.technion.ac.il\/en\/#\/schema\/person\/d65b78b7a7446bdf9fb69078573b8320"},"breadcrumb":{"@id":"https:\/\/www.technion.ac.il\/en\/blog\/hacking-for-future-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.technion.ac.il\/en\/blog\/hacking-for-future-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.technion.ac.il\/en\/blog\/hacking-for-future-security\/#primaryimage","url":"https:\/\/www.technion.ac.il\/wp-content\/uploads\/2019\/08\/BH-300x259.jpg","contentUrl":"https:\/\/www.technion.ac.il\/wp-content\/uploads\/2019\/08\/BH-300x259.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.technion.ac.il\/en\/blog\/hacking-for-future-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home Page","item":"https:\/\/www.technion.ac.il\/en\/"},{"@type":"ListItem","position":2,"name":"Hacking for Future Security"}]},{"@type":"WebSite","@id":"https:\/\/www.technion.ac.il\/en\/#website","url":"https:\/\/www.technion.ac.il\/en\/","name":"\u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.technion.ac.il\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.technion.ac.il\/en\/#\/schema\/person\/d65b78b7a7446bdf9fb69078573b8320","name":"shlomi ben-oz","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.technion.ac.il\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5b97bb3947cb26db7c002c11fa0f50454ced53af5f27e730cc60fec87ae78347?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5b97bb3947cb26db7c002c11fa0f50454ced53af5f27e730cc60fec87ae78347?s=96&d=mm&r=g","caption":"shlomi ben-oz"},"url":"https:\/\/www.technion.ac.il\/en\/blog\/author\/ben-ozshlomitechnion-ac-il\/"}]}},"_links":{"self":[{"href":"https:\/\/www.technion.ac.il\/en\/wp-json\/wp\/v2\/posts\/84509","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technion.ac.il\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technion.ac.il\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technion.ac.il\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technion.ac.il\/en\/wp-json\/wp\/v2\/comments?post=84509"}],"version-history":[{"count":0,"href":"https:\/\/www.technion.ac.il\/en\/wp-json\/wp\/v2\/posts\/84509\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.technion.ac.il\/en\/wp-json\/wp\/v2\/media?parent=84509"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technion.ac.il\/en\/wp-json\/wp\/v2\/categories?post=84509"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technion.ac.il\/en\/wp-json\/wp\/v2\/tags?post=84509"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}