64 resultados para Smart cards
Resumo:
A novel method to fabricate chemically linked conducting polymer–biopolymer composites that are intrinsically flexible and conducting for functional electrode applications is presented. Polypyrrole was synthesised in situ during the cellulose regeneration process using the 1-butyl-3-methylimidazolium chloride ionic liquid as a solvent medium. The obtained polypyrrole–cellulose composite was chemically blended and showed flexible polymer properties while retaining the electronic properties of a conducting polymer. Addition of an ionic liquid such as trihexyl(tetradecyl)phosphonium bis(trifluoromethylsulfonyl)imide, enhanced the flexibility of the composite. The functional application of these materials in the electrochemically controlled release of a model drug has been demonstrated. This strategy opens up a new design for a wide spectrum of materials for smart electronic device applications wherein the functionality of doping and de-doping of conducting polymers is retained and their processability issue is addressed by exploiting an ionic liquid route.
Resumo:
The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable attack specific modules for DDoS, spamming, info-stealing, remote access, boot-sector formatting etc. BlackEnergy has been involved in several high profile cyber physical attacks including the recent Ukraine power grid attack in December 2015. This paper investigates the evolution of BlackEnergy and its cyber attack capabilities. It presents a basic cyber attack model used by BlackEnergy for targeting industrial control systems. In particular, the paper analyzes cyber threats of BlackEnergy for synchrophasor based systems which are used for real-time control and monitoring functionalities in smart grid. Several BlackEnergy based attack scenarios have been investigated by exploiting the vulnerabilities in two widely used synchrophasor communication standards: (i) IEEE C37.118 and (ii) IEC 61850-90-5. Specifically, the paper addresses reconnaissance, DDoS, man-in-the-middle and replay/reflection attacks on IEEE C37.118 and IEC 61850-90-5. Further, the paper also investigates protection strategies for detection and prevention of BlackEnergy based cyber physical attacks.