In 2024, the focus was on nuclear energy with " A Practical Analysis of Cyber-Physical Attacks Against Nuclear Reactors ", and this year it is the turn of solar photovoltaic generation, completing the coverage of the carbon-free energy sources I consider crucial for Europe's energy sovereignty. I hope it will be useful and interesting, just as the previous one was for some people. The paper is structured to facilitate a linear reading and understanding by a variety of readers, although a minimal technical background is assumed. What will you find in this paper? A mix of theory and practice. An introduction that describes the technical characteristics, from both cyber and physics perspectives, of photovoltaic generation, grid-following inverters, and power grids required to understand the subsequent cyber-physical attack scenarios “Cyber-physical Attacks on Solar Inverters” characterizes the type of impact a successful exploitation of grid-following inverters can have on...
Index Introduction PhysicsFiction state_monitor state_physics state_physics #2 — A key part state_physics #3 — The attack What about the target? Conclusions Introduction This past friday Juan Andres Guerrero-Saade and Vitaly Kamluk published an extraordinary piece of research, which uncovered a 20 years old sophisticated malware, plausibly attributed to state actors. What is outstanding about this implant is, as the authors mention, that "fast16.sys selectively targets high-precision calculation software, patching code in memory to tamper with results." That's insane…and very real. I'll try to contribute to the public understanding of Fast16 by digging into the function that targets the physics simulations. At this point, there is little left to add about Stuxnet, but it is important to use it as a temporal reference, because Fast16 was allegedly active years before the malware that changed everything. Around 2...