DEFCON 20: Hacking smart meters

At the recent DEFCON 20 conference in Las Vegas, Don C. Weber presented this talk on smart meter technology and security. The presentation deals with the optical port found on smart meters, and covers attacks from quick memory acquisition techniques to more complex hardware bus sniffing, as well as how authentication credentials are acquired. Finally, a method for interacting with a meter’s IR port will be introduced to show that vendor specific software is not necessary to probe these meters.

The white paper and related PDF from the presentation are available.

Part 1 of the video appears above, with links to the remaining parts below:
Part 2
Part 3 (Hmmm, could that be a Bus Pirate v.3 ?)
Part 4
Part 5

Join the Conversation

2 Comments

  1. The links to the white paper and pdf are not working – I would really like to get a copy of these – can you fix this???

Leave a comment

Your email address will not be published. Required fields are marked *

Notify me of followup comments via e-mail. You can also subscribe without commenting.