Abusing legacy railroad signaling systems
DAY 1
15:40-
16:20
Automatic Train Stop (ATS) systems are extensively deployed worldwide, utilizing various approaches tailored to regional and national technologies and integrating legacy systems established decades ago. In this session, we will explore the vulnerabilities within these systems, focusing on Japanese ATS and European counterparts, particularly the Spanish ASFA system, through a live demonstration. We will examine the potential for exploitation by analyzing the internal mechanisms and demonstrate how decoy devices, constructed with inexpensive components, can manipulate train operations by generating rogue signals.
-
Location :
-
Track 1(HALL B)
-
-
Category :
-
General
-
-
Share :
Speakers
-
David Melendez
ダビド・メレンデス
David Melendez is a security researcher who has over twelve years of experience in cybersecurity and hardware hacking. He has a proven track record of presenting his groundbreaking investigations at prestigious conferences around the world, including DEFCON, BLACKHAT, and ROOTEDCON.
David is also a drone creator and author of the book "Hacking with Drones," which showcases his innovative use of drones in cybersecurity research. With his passion for pushing the boundaries of technology, David is constantly seeking new ways to improve the security and functionality of embedded systems