Multiple Vendor

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 219 Experts worldwide ranked by ideXlab platform

Patrick Mcdaniel - One of the best experts on this subject based on the ideXlab platform.

  • Structured Security Testing in the Smartgrid
    2015
    Co-Authors: Patrick Mcdaniel, Stephan Mclaughlin
    Abstract:

    Abstract—The advanced metering infrastructure (AMI) is revolutionizing electrical grids. Intelligent AMI “smart meters” report real time usage data that enables efficient energy gener-ation and use. However, aggressive deployments often outpace security efforts: new devices from a dizzying array of Vendors are being introduced into grids with limited understanding of the security problems they represent. In this paper we develop an archetypal attack tree approach to guide penetration testing across Multiple-Vendor implementations of a technology class. In this, we graft archetypal attack trees modeling broad adversary goals and attack vectors to Vendor-specific concrete attack trees. Evaluators then use the grafted trees as a roadmap to penetration testing. Our experiments with Multiple Vendors generate real attack scenarios using vulnerabilities identified during directed penetration testing, e.g., manipulation of energy usage data, spoofing meters, and extracting sensitive data from internal registers. We provide a detailed example of one such attack as tested using our developed methodology. I

  • ISCCSP - Structured security testing in the smart grid
    2012 5th International Symposium on Communications Control and Signal Processing, 2012
    Co-Authors: Patrick Mcdaniel, Stephan Mclaughlin
    Abstract:

    The advanced metering infrastructure (AMI) is revolutionizing electrical grids. Intelligent AMI “smart meters” report real time usage data that enables efficient energy generation and use. However, aggressive deployments often outpace security efforts: new devices from a dizzying array of Vendors are being introduced into grids with limited understanding of the security problems they represent. In this paper we develop an archetypal attack tree approach to guide penetration testing across Multiple-Vendor implementations of a technology class. In this, we graft archetypal attack trees modeling broad adversary goals and attack vectors to Vendor-specific concrete attack trees. Evaluators then use the grafted trees as a roadmap to penetration testing. Our experiments with Multiple Vendors generate real attack scenarios using vulnerabilities identified during directed penetration testing, e.g., manipulation of energy usage data, spoofing meters, and extracting sensitive data from internal registers. We provide a detailed example of one such attack as tested using our developed methodology.

  • multi Vendor penetration testing in the advanced metering infrastructure
    Annual Computer Security Applications Conference, 2010
    Co-Authors: Stephen Mclaughlin, Sergei Miadzvezhanka, Adam Delozier, Dmitry Podkuiko, Patrick Mcdaniel
    Abstract:

    The advanced metering infrastructure (AMI) is revolutionizing electrical grids. Intelligent AMI "smart meters" report real time usage data that enables efficient energy generation and use. However, aggressive deployments are outpacing security efforts: new devices from a dizzying array of Vendors are being introduced into grids with little or no understanding of the security problems they represent. In this paper we develop an archetypal attack tree approach to guide penetration testing across Multiple-Vendor implementations of a technology class. In this, we graft archetypal attack trees modeling broad adversary goals and attack vectors to Vendor-specific concrete attack trees. Evaluators then use the grafted trees as a roadmap to penetration testing. We apply this approach within AMI to model attacker goals such as energy fraud and denial of service. Our experiments with Multiple Vendors generate real attack scenarios using vulnerabilities identified during directed penetration testing, e.g., manipulation of energy usage data, spoofing meters, and extracting sensitive data from internal registers. More broadly, we show how we can reuse efforts in penetration testing to efficiently evaluate the increasingly large body of AMI technologies being deployed in the field.

  • ACSAC - Multi-Vendor penetration testing in the advanced metering infrastructure
    Proceedings of the 26th Annual Computer Security Applications Conference on - ACSAC '10, 2010
    Co-Authors: Stephen Mclaughlin, Sergei Miadzvezhanka, Adam Delozier, Dmitry Podkuiko, Patrick Mcdaniel
    Abstract:

    The advanced metering infrastructure (AMI) is revolutionizing electrical grids. Intelligent AMI "smart meters" report real time usage data that enables efficient energy generation and use. However, aggressive deployments are outpacing security efforts: new devices from a dizzying array of Vendors are being introduced into grids with little or no understanding of the security problems they represent. In this paper we develop an archetypal attack tree approach to guide penetration testing across Multiple-Vendor implementations of a technology class. In this, we graft archetypal attack trees modeling broad adversary goals and attack vectors to Vendor-specific concrete attack trees. Evaluators then use the grafted trees as a roadmap to penetration testing. We apply this approach within AMI to model attacker goals such as energy fraud and denial of service. Our experiments with Multiple Vendors generate real attack scenarios using vulnerabilities identified during directed penetration testing, e.g., manipulation of energy usage data, spoofing meters, and extracting sensitive data from internal registers. More broadly, we show how we can reuse efforts in penetration testing to efficiently evaluate the increasingly large body of AMI technologies being deployed in the field.

  • multi Vendor penetration testing in the advanced metering infrastructure
    Annual Computer Security Applications Conference, 2010
    Co-Authors: Stephen Mclaughlin, Sergei Miadzvezhanka, Adam Delozier, Dmitry Podkuiko, Patrick Mcdaniel
    Abstract:

    The advanced metering infrastructure (AMI) is revolutionizing electrical grids. Intelligent AMI "smart meters" report real time usage data that enables efficient energy generation and use. However, aggressive deployments are outpacing security efforts: new devices from a dizzying array of Vendors are being introduced into grids with little or no understanding of the security problems they represent. In this paper we develop an archetypal attack tree approach to guide penetration testing across Multiple-Vendor implementations of a technology class. In this, we graft archetypal attack trees modeling broad adversary goals and attack vectors to Vendor-specific concrete attack trees. Evaluators then use the grafted trees as a roadmap to penetration testing. We apply this approach within AMI to model attacker goals such as energy fraud and denial of service. Our experiments with Multiple Vendors generate real attack scenarios using vulnerabilities identified during directed penetration testing, e.g., manipulation of energy usage data, spoofing meters, and extracting sensitive data from internal registers. More broadly, we show how we can reuse efforts in penetration testing to efficiently evaluate the increasingly large body of AMI technologies being deployed in the field.

M.f. Robinson - One of the best experts on this subject based on the ideXlab platform.

Stephen Mclaughlin - One of the best experts on this subject based on the ideXlab platform.

  • multi Vendor penetration testing in the advanced metering infrastructure
    Annual Computer Security Applications Conference, 2010
    Co-Authors: Stephen Mclaughlin, Sergei Miadzvezhanka, Adam Delozier, Dmitry Podkuiko, Patrick Mcdaniel
    Abstract:

    The advanced metering infrastructure (AMI) is revolutionizing electrical grids. Intelligent AMI "smart meters" report real time usage data that enables efficient energy generation and use. However, aggressive deployments are outpacing security efforts: new devices from a dizzying array of Vendors are being introduced into grids with little or no understanding of the security problems they represent. In this paper we develop an archetypal attack tree approach to guide penetration testing across Multiple-Vendor implementations of a technology class. In this, we graft archetypal attack trees modeling broad adversary goals and attack vectors to Vendor-specific concrete attack trees. Evaluators then use the grafted trees as a roadmap to penetration testing. We apply this approach within AMI to model attacker goals such as energy fraud and denial of service. Our experiments with Multiple Vendors generate real attack scenarios using vulnerabilities identified during directed penetration testing, e.g., manipulation of energy usage data, spoofing meters, and extracting sensitive data from internal registers. More broadly, we show how we can reuse efforts in penetration testing to efficiently evaluate the increasingly large body of AMI technologies being deployed in the field.

  • ACSAC - Multi-Vendor penetration testing in the advanced metering infrastructure
    Proceedings of the 26th Annual Computer Security Applications Conference on - ACSAC '10, 2010
    Co-Authors: Stephen Mclaughlin, Sergei Miadzvezhanka, Adam Delozier, Dmitry Podkuiko, Patrick Mcdaniel
    Abstract:

    The advanced metering infrastructure (AMI) is revolutionizing electrical grids. Intelligent AMI "smart meters" report real time usage data that enables efficient energy generation and use. However, aggressive deployments are outpacing security efforts: new devices from a dizzying array of Vendors are being introduced into grids with little or no understanding of the security problems they represent. In this paper we develop an archetypal attack tree approach to guide penetration testing across Multiple-Vendor implementations of a technology class. In this, we graft archetypal attack trees modeling broad adversary goals and attack vectors to Vendor-specific concrete attack trees. Evaluators then use the grafted trees as a roadmap to penetration testing. We apply this approach within AMI to model attacker goals such as energy fraud and denial of service. Our experiments with Multiple Vendors generate real attack scenarios using vulnerabilities identified during directed penetration testing, e.g., manipulation of energy usage data, spoofing meters, and extracting sensitive data from internal registers. More broadly, we show how we can reuse efforts in penetration testing to efficiently evaluate the increasingly large body of AMI technologies being deployed in the field.

  • multi Vendor penetration testing in the advanced metering infrastructure
    Annual Computer Security Applications Conference, 2010
    Co-Authors: Stephen Mclaughlin, Sergei Miadzvezhanka, Adam Delozier, Dmitry Podkuiko, Patrick Mcdaniel
    Abstract:

    The advanced metering infrastructure (AMI) is revolutionizing electrical grids. Intelligent AMI "smart meters" report real time usage data that enables efficient energy generation and use. However, aggressive deployments are outpacing security efforts: new devices from a dizzying array of Vendors are being introduced into grids with little or no understanding of the security problems they represent. In this paper we develop an archetypal attack tree approach to guide penetration testing across Multiple-Vendor implementations of a technology class. In this, we graft archetypal attack trees modeling broad adversary goals and attack vectors to Vendor-specific concrete attack trees. Evaluators then use the grafted trees as a roadmap to penetration testing. We apply this approach within AMI to model attacker goals such as energy fraud and denial of service. Our experiments with Multiple Vendors generate real attack scenarios using vulnerabilities identified during directed penetration testing, e.g., manipulation of energy usage data, spoofing meters, and extracting sensitive data from internal registers. More broadly, we show how we can reuse efforts in penetration testing to efficiently evaluate the increasingly large body of AMI technologies being deployed in the field.

Ali Diabat - One of the best experts on this subject based on the ideXlab platform.

  • Multiple-Vendor, Multiple-retailer based Vendor-managed inventory
    Annals of Operations Research, 2016
    Co-Authors: Xianpei Hong, Wang Chunyuan, Lei Xu, Ali Diabat
    Abstract:

    Vendor-managed inventory is a coordinated system where a Vendor decides about the retailer’s replenishment quantity and time. This work studies a two-echelon distribution work composed of Multiple Vendors and retailers in traditional and Vendor-managed inventory systems where unsatisfied demands are lost sales. We also consider that the retailers’ demand is stochastic following a uniform distribution. The mathematical models are developed and applied in Vendor-managed inventory and traditional systems. Under the traditional supply chain, the Vendor incurs the cost of holding and production setup, while a retailer incurs expenses for inventory holding, ordering, transportation and lost sales. In a Vendor-managed inventory system, as the Vendor is responsible for his retailers, the retailer’s costs are transferred to the Vendor. We aim to identify benefits of Vendor-managed inventory. The total cost per unit time is used as a comparable measure between Vendor-managed inventory and traditional systems. Numerical examples and a sensitivity analysis of key parameters include the Vendor’s setup cost and holding cost; the retailer’s transportation and ordering costs are presented in both Vendor-managed inventory and traditional systems. The results illustrate that Vendor-managed inventory total system inventory cost is lower than a traditional system where shortage is allowed. Copyright Springer Science+Business Media New York 2016

  • Multiple-Vendor, Multiple-retailer based Vendor-managed inventory
    Annals of Operations Research, 2015
    Co-Authors: Xianpei Hong, Wang Chunyuan, Ali Diabat
    Abstract:

    Vendor-managed inventory is a coordinated system where a Vendor decides about the retailer’s replenishment quantity and time. This work studies a two-echelon distribution work composed of Multiple Vendors and retailers in traditional and Vendor-managed inventory systems where unsatisfied demands are lost sales. We also consider that the retailers’ demand is stochastic following a uniform distribution. The mathematical models are developed and applied in Vendor-managed inventory and traditional systems. Under the traditional supply chain, the Vendor incurs the cost of holding and production setup, while a retailer incurs expenses for inventory holding, ordering, transportation and lost sales. In a Vendor-managed inventory system, as the Vendor is responsible for his retailers, the retailer’s costs are transferred to the Vendor. We aim to identify benefits of Vendor-managed inventory. The total cost per unit time is used as a comparable measure between Vendor-managed inventory and traditional systems. Numerical examples and a sensitivity analysis of key parameters include the Vendor’s setup cost and holding cost; the retailer’s transportation and ordering costs are presented in both Vendor-managed inventory and traditional systems. The results illustrate that Vendor-managed inventory total system inventory cost is lower than a traditional system where shortage is allowed.

Adam Delozier - One of the best experts on this subject based on the ideXlab platform.

  • multi Vendor penetration testing in the advanced metering infrastructure
    Annual Computer Security Applications Conference, 2010
    Co-Authors: Stephen Mclaughlin, Sergei Miadzvezhanka, Adam Delozier, Dmitry Podkuiko, Patrick Mcdaniel
    Abstract:

    The advanced metering infrastructure (AMI) is revolutionizing electrical grids. Intelligent AMI "smart meters" report real time usage data that enables efficient energy generation and use. However, aggressive deployments are outpacing security efforts: new devices from a dizzying array of Vendors are being introduced into grids with little or no understanding of the security problems they represent. In this paper we develop an archetypal attack tree approach to guide penetration testing across Multiple-Vendor implementations of a technology class. In this, we graft archetypal attack trees modeling broad adversary goals and attack vectors to Vendor-specific concrete attack trees. Evaluators then use the grafted trees as a roadmap to penetration testing. We apply this approach within AMI to model attacker goals such as energy fraud and denial of service. Our experiments with Multiple Vendors generate real attack scenarios using vulnerabilities identified during directed penetration testing, e.g., manipulation of energy usage data, spoofing meters, and extracting sensitive data from internal registers. More broadly, we show how we can reuse efforts in penetration testing to efficiently evaluate the increasingly large body of AMI technologies being deployed in the field.

  • ACSAC - Multi-Vendor penetration testing in the advanced metering infrastructure
    Proceedings of the 26th Annual Computer Security Applications Conference on - ACSAC '10, 2010
    Co-Authors: Stephen Mclaughlin, Sergei Miadzvezhanka, Adam Delozier, Dmitry Podkuiko, Patrick Mcdaniel
    Abstract:

    The advanced metering infrastructure (AMI) is revolutionizing electrical grids. Intelligent AMI "smart meters" report real time usage data that enables efficient energy generation and use. However, aggressive deployments are outpacing security efforts: new devices from a dizzying array of Vendors are being introduced into grids with little or no understanding of the security problems they represent. In this paper we develop an archetypal attack tree approach to guide penetration testing across Multiple-Vendor implementations of a technology class. In this, we graft archetypal attack trees modeling broad adversary goals and attack vectors to Vendor-specific concrete attack trees. Evaluators then use the grafted trees as a roadmap to penetration testing. We apply this approach within AMI to model attacker goals such as energy fraud and denial of service. Our experiments with Multiple Vendors generate real attack scenarios using vulnerabilities identified during directed penetration testing, e.g., manipulation of energy usage data, spoofing meters, and extracting sensitive data from internal registers. More broadly, we show how we can reuse efforts in penetration testing to efficiently evaluate the increasingly large body of AMI technologies being deployed in the field.

  • multi Vendor penetration testing in the advanced metering infrastructure
    Annual Computer Security Applications Conference, 2010
    Co-Authors: Stephen Mclaughlin, Sergei Miadzvezhanka, Adam Delozier, Dmitry Podkuiko, Patrick Mcdaniel
    Abstract:

    The advanced metering infrastructure (AMI) is revolutionizing electrical grids. Intelligent AMI "smart meters" report real time usage data that enables efficient energy generation and use. However, aggressive deployments are outpacing security efforts: new devices from a dizzying array of Vendors are being introduced into grids with little or no understanding of the security problems they represent. In this paper we develop an archetypal attack tree approach to guide penetration testing across Multiple-Vendor implementations of a technology class. In this, we graft archetypal attack trees modeling broad adversary goals and attack vectors to Vendor-specific concrete attack trees. Evaluators then use the grafted trees as a roadmap to penetration testing. We apply this approach within AMI to model attacker goals such as energy fraud and denial of service. Our experiments with Multiple Vendors generate real attack scenarios using vulnerabilities identified during directed penetration testing, e.g., manipulation of energy usage data, spoofing meters, and extracting sensitive data from internal registers. More broadly, we show how we can reuse efforts in penetration testing to efficiently evaluate the increasingly large body of AMI technologies being deployed in the field.