If You Can’t Secure Your Hardware, You Can’t Secure Your Software

Abstract: As global infrastructure becomes increasingly digital and interconnected, securing
software alone is insufficient to defend against threats targeting critical systems. Vulnerabilities
at the hardware level, from inverters in solar panels to semiconductors and memory chips,
present exploitable entry points that undermine even the most secure software environments.
Drawing from real-world incidents, academic research, and government assessments, this paper
outlines how cyber-physical system vulnerabilities, memory safety flaws, and malicious
hardware implants converge to create systemic risks. The study emphasizes the imperative of
hardware-level security as foundational to software resilience.
Hardware Infrastructure and Critical Grid Vulnerabilities

  1. Climate Change and Electrical Grid Vulnerabilities
    Human-caused climate change is increasing the frequency and intensity of extreme weather
    events, placing growing stress on aging energy infrastructure and contributing significantly to
    major power outages in the United States and across the world. The electrical grid, originally
    designed for a different climate era, depends heavily on above-ground components—
    transformers, transmission lines, and utility poles that are exposed to threats such as high winds,
    heavy rain, ice, lightning, and extreme heat. Even buried lines remain vulnerable to flooding.
    Extreme weather events often span large areas, causing outages across multiple interconnected
    states. A total of 1,755 weather-related outages have been recorded nationally. Enhancing grid
    resilience will be both expensive and difficult, while rapidly reducing emissions remains the

most impactful way to ease pressure on the system and allow more time for adaptation (Weather-
related Power Outages Rising | Climate Central, n.d.).

  1. Complex Network Theory and Grid Resilience Metrics
    Modern societies depend heavily on critical infrastructure systems such as electricity, water,
    healthcare, and transportation whose disruption can lead to significant public and economic
    consequences. To better understand and improve the resilience of these systems, especially
    power networks, researchers have increasingly adopted the framework of complex network

theory. Traditional approaches have largely focused on network connectivity using percolation-
based models, but these alone fail to capture the operational risks faced by power grids,

particularly under varying supply and demand conditions. To address these limitations, a new
metric called “net-ability” has been introduced. Unlike conventional efficiency-based metrics,
net-ability incorporates the physical laws governing electricity flow, accounts for power flow
allocation, and respects transmission flow limits, thereby providing a more realistic assessment
of grid vulnerabilities. Research findings suggest that net-ability is effective in identifying
critical transmission lines. However, like earlier models, it remains limited by its static and
topological perspective, without accounting for the dynamic behavior of energy systems over
time. Validation using real-world data from Italy’s national grid (Terna) revealed a strong
correlation between net-ability results and actual system performance, underscoring its potential
as a practical resilience metric—although the specific validation outcomes remain confidential
(Arianos et al., 2009).

Solar energy systems are deployed at different scales like residential (6–20 rooftop panels per
home), commercial (around 100 kW), and utility-scale (≥1 MW). Although 97% of U.S. solar
installations are residential, most solar energy is generated from large-scale utility systems,
which are often managed through centralized utility control centers. These industrial systems,
while potentially more robust, also represent concentrated points of failure in the network. In
contrast, commercial installations are growing in relevance, particularly in countries like Canada,
Australia, and the U.S. Geographic variations highlight different vulnerabilities: for example,
while the U.S. grid is highly distributed with over 5 million small-scale solar sites, in the
Netherlands, over 57% of solar power comes from industrial installations. These distinctions are
vital when assessing grid resilience using complex network theory, as different node types pose
different risks and resilience capacities in the face of cyber or physical disruptions (Forsecout
Researcher, 2025).

  1. Load Frequency Control Threats and Exploitation of Solar Inverter Vulnerabilities
    Power grids must balance electricity supply and demand in real time to maintain stable
    frequencies (60Hz in the U.S., 50Hz in Europe). This balance is becoming harder due to
    increasing reliance on decentralized solar power. Events like the Blue Cut Fire, Odessa
    Disturbance, and Sri Lanka blackout highlight how sudden solar output losses threaten stability.
    Cyber-induced load-altering attacks (LAAs), first introduced in the “Horus Scenario,” use
    compromised IoT devices and smart inverters to disrupt this balance. While single systems pose
    low risk, coordinated attacks on Distributed Energy Resources (DERs)—such as 536,000
    inverters—could surpass Europe’s 3GW emergency threshold. Key manufacturers like Sungrow
    (740 GW), Growatt (300 GW), and SMA (132 GW) dominate DER capacity in the U.S. and
    Europe, making them vulnerable targets Forsecout Researcher, 2025).
    New vulnerabilities in Growatt and Sungrow inverters allow attackers to hijack devices via
    exposed APIs, IDOR flaws, and remote code execution exploits. These enable “dynamic load
    attacks,” where inverter output is rapidly altered in real time, overwhelming grid controls.
    Beyond grid disruption, attackers can steal user data, hijack smart home devices, manipulate
    energy markets, or demand ransom. Such threats are recognized by agencies like NASEO and
    the U.S. Department of Energy as serious risks to grid security and stability Forsecout
    Researcher, 2025).
  2. False Data Injection Attacks and Cybersecurity Challenges in Smart Grids

Smart grids, which combine digital technologies with traditional power systems, allow for real-
time monitoring and decision-making through cyber-physical systems. Unlike traditional grids

where most operations happen in secured control centers, smart grids rely on local devices like
smart meters to control energy use. This makes them more efficient but also more vulnerable to
cyberattacks.
One major threat is False Data Injection Attacks (FDIAs), where attackers send fake data to
disrupt energy demand and supply. These attacks can cause serious consequences, including
power outages, financial loss, and inefficient energy distribution. FDIA targets include:

Target
Area

Description of FDI
Attack Impact Attack Method

Energy
Demand

Falsified consumption
data underreports or
overreports actual
usage.

Increased financial costs, energy waste,
or power outages due to unmet true
demand.

Infected personal
devices, weak
firewalls

Energy
Supply

Manipulated supply
data overstates or
understates actual
energy available.

Starvation of demand nodes or energy
waste; disrupted energy distribution.

Malware
infecting supplier
servers

Grid-
Network

States

Fake data alters grid
topology or powerline
capacities.

Node isolation, incorrect routing, costly
or inefficient distribution.

Forged network
configuration
data

Electricity
Pricing

False pricing during
peak/off-peak times or
tampered energy bills.

Grid overload, loss of revenue for utility
companies, inefficient load balancing.

Malware to alter
pricing systems
or user accounts
Traditional detection methods often fail because they monitor group-level behavior and ignore
individual device manipulation. Attackers exploit this by targeting vulnerable devices like smart
meters. Researchers propose new detection techniques using spatiotemporal correlations and
trust-based voting systems to identify unreliable data. Smart grids, due to their decentralized
nature, make it hard to physically protect every device, so FDIA attackers can inject fake data
using grid layout knowledge, disrupting control functions without being noticed. Defense against
FDIAs includes: a) Strategic placement of key devices (cyber-physical defense), and b)
Detection methods like dynamic state tracking and game theory. However, these static strategies
can’t keep up with evolving threats (Detection of False Data Injection Attacks in Smart-grid
Systems, 2015).

  1. Exploitation of Cyber Vulnerabilities in Electric Smart Appliances (ESAs) for
    Coordinated Load-Altering Attacks
    Attackers targeting the power grid first identify its weakest nodes, then assess if a load-altering
    attack would destabilize the system. They use modal analysis to evaluate feasibility: by updating
    power consumption at the weakest nodes based on their botnet’s capacity, they perform AC load
    flow analysis and recalculate system matrices (JPq, JPV, JQq, JQV). Using this data, they
    compute the voltage stability index (VQS). If the VQS becomes negative after the simulated
    attack, it indicates instability and confirms the attack’s feasibility. If not, the botnet is
    insufficient, and the attackers wait five minutes for changes in grid conditions before
    reattempting. This evaluation method can achieve up to 90% accuracy (Shekari et al., 2022).
    Nation-State Threats and Infrastructure Intrusions
  2. National Security Risks and Global Policy Responses to Rogue Communication Devices
    in Chinese-Made Solar Inverters

U.S. energy officials are reassessing the risks associated with Chinese-made power inverters
after uncovering undocumented communication components, such as rogue cellular radios, in
some solar inverters and batteries. These devices, which connect solar panels, wind turbines,
batteries, and EV chargers to the grid, are critical to renewable energy infrastructure and
predominantly manufactured in China. The undocumented components could potentially bypass
firewalls, allowing for unauthorized remote access, control, or shutdown, posing a threat to grid
stability and raising concerns of catastrophic blackouts. While the number of affected devices
and specific manufacturers remain undisclosed, former NSA Director Mike Rogers warned these
vulnerabilities might be deliberate. The Department of Energy is pushing for increased
transparency through the Software Bill of Materials (SBOMs) and urges purchasers to
understand all device capabilities. Utilities like Florida Power & Light are reducing reliance on
Chinese inverters, and U.S. lawmakers have introduced legislation to ban DHS purchases from
six major Chinese battery firms by 2027. Globally, over 200 GW of solar capacity in Europe
depends on Chinese inverters, and incidents like a reported remote shutdown of inverters in
November 2024 have raised further alarms. Countries including Lithuania, Estonia, and the UK
are taking steps to restrict or review Chinese tech in their grids, while NATO has urged member
states to reduce strategic dependencies on Chinese infrastructure. The situation underscores the
urgent need to address security vulnerabilities in energy systems as regulation lags behind other
critical sectors (Mcfarlane & Reuters, 2025).

  1. Volt Typhoon’s Silent Breach of the U.S. Power Grid
    ICS/OT security firm Dragos revealed that the Chinese threat actor Volt Typhoon, also known as
    Voltzite, infiltrated the Littleton Electric Light and Water Departments (LELWD) in
    Massachusetts, remaining undetected for over 300 days between February and November 2023.
    The breach was discovered just before Thanksgiving during Dragos’ deployment of OT security
    solutions, prompting an expedited defense rollout. Volt Typhoon, linked to the Chinese
    government and first reported by Microsoft in May 2023, has been associated with espionage
    activities targeting U.S. critical infrastructure. During the intrusion, the group collected OT
    system data and spatial layout information related to grid operations and exfiltrated data on OT
    procedures, suggesting preparation for Stage 2 ICS Cyber Kill Chain attacks. Although no direct
    ICS disruption was observed, the stolen data and persistent access present serious risks.
    Additionally, Volt Typhoon was found exfiltrating GIS data from other targets, indicating
    broader efforts to map energy infrastructure for potential future sabotage. This case highlights
    the significant threat posed by nation-state actors maintaining long-term access to critical
    infrastructure networks in preparation for cyber-physical attacks (Kovacs, 2025).
  2. Salt Typhoon: A Cybersecurity Wake-Up Call for U.S. Critical Infrastructure
    Salt Typhoon was a highly sophisticated cyberattack that targeted critical U.S. infrastructure,
    focusing primarily on internet service providers (ISPs), and caused disruptions across the energy,
    transportation, and healthcare sectors. The attackers used zero-day exploits and advanced
    obfuscation techniques to evade detection, resulting in operational and financial harm. At least
    nine major U.S. telecom companies, including Verizon, AT&T, and T-Mobile were affected,
    with attackers gaining access to lawful intercept systems and exposing sensitive government
    communications and investigations. Additionally, metadata from over a million users was
    accessed, raising serious privacy and national security concerns. Though financial losses were

not disclosed, the targeted companies represent over $334 billion in annual revenue,
underscoring the potential economic impact. In the aftermath, companies faced compliance costs,
legal actions, and erosion of public trust, with outdated systems, poor threat detection, and weak
identity verification identified as key vulnerabilities. The attack highlighted the urgent need for
zero-trust frameworks and AI-powered cybersecurity. Federal agencies like CISA and the FBI
have taken the lead in response efforts, promoting real-time threat intelligence sharing and
providing technical and financial support to aid industry recovery (Salt Typhoon: A Wake-up
Call for Critical Infrastructure, 2025).

  1. Rising Threat Landscape: Nine Active OT Cyber Groups and Emerging ICS Malware in
    2024
    Dragos released its 2025 OT/ICS Cybersecurity Report, outlining key cyber threat activities and
    trends identified across operational technology and industrial control systems in 2024 (Kovacs,
    2025).
    Category Details

Report Overview

Dragos published its 2025 OT/ICS Cybersecurity Report,
detailing cyber threat trends observed in 2024 across industrial
control systems (ICS) and operational technology (OT).
Active Threat Groups Out of 23 total threat groups tracked, 9 were active in 2024.

Newly Added Threat Groups

Bauxite (linked to Iran):

  • Uses CyberAv3ngers persona• Targeted energy, water, food &
    beverage, chemical sectors in the US, Europe, Australia, and the
    Middle East
  • Used custom malware IOCONTROL to target IoT and OT
    devices in the US and IsraelGraphite (linked to Russia, aka
    APT28):
  • Targeted organizations related to the Ukraine conflict

Groups with Stage 2 ICS
Cyber Kill Chain
Capabilities

  • Bauxite
  • Chernovite (behind Pipedream/Incontroller attack)•
    Voltzite (aka Volt Typhoon, known for OT data exfiltration)
  • Electrum (aka Sandworm, developer of AcidPour malware)

New Malware &
Capabilities

  • AcidPour – Wiper by Electrum targeting OT devices, with
    potential for high disruption• Fuxnet – Destructive malware used
    by Ukraine against Russian infrastructure
  • FrostyGoop – Caused heating loss in a Ukrainian city

Ransomware Trends

  • 80 ransomware groups targeted industrial organizations in 2024
    (up from 50 in 2023)
  • Represents an 87% surge in ransomware activity
  • No ICS-specific ransomware detected, but disruptions and data
    exfiltration occurred that may aid future attacks
  1. Adversarial Motivations, Goals, Capabilities, and Malicious Activities in Smart Grid
    Cyberattacks
    A) Motivations and Goals:
    This section explains why adversaries target smart grids, breaking down their intentions and
    strategic objectives:

a) Geopolitical: Exploiting the grid to gain regional or political dominance (e.g.,
Ukraine conflict).
b) Sector Damage: Intentionally disrupting or sabotaging the energy sector or
specific companies.
c) User Harm: Attacks that impact end-users directly—compromising their privacy,
safety, or property.
d) Financial Gain: Includes economic exploitation through ransom, market
manipulation, or fraud.
e) Fame and Recognition: Perpetrators seek acknowledgment or notoriety by
executing high-profile attacks.

Typical Goals include:
a) Reconnaissance: Mapping out the grid’s assets, security, and personnel.
b) Service Disruption: Causing blackouts or halting operations to impact critical
infrastructure and national resilience.
c) Data Theft: Stealing consumption, financial, or personal data for exploitation.
d) Market Manipulation: Skewing energy market dynamics for economic disruption.
e) Electricity Bill Tampering: Fraudulently altering billing or usage data for gain or
sabotage.
B) Capabilities
This section covers how adversaries technically carry out attacks, outlining their tactical and
operational abilities:
a) Access:

  • Physical Access: Exploiting insecure smart meters or substations requiring
    physical-layer expertise.
  • Remote Access: Leveraging weak or unprotected protocols (e.g., Modbus)
    for remote intrusion.

b) Exploitation:

  • Command Injection: Executing unauthorized instructions to manipulate
    devices like SCADA systems.
  • False Data Injection: Corrupting system data to distort decision-making
    and control.
  • Denial of Service (DoS): Crippling grid functionality via flooding,
    spoofing, or system abuse.
  • Eavesdropping: Intercepting communication to steal data or stage more
    advanced attacks.

c) Lateral Movement & Privilege Escalation: Expanding control across networks
post-intrusion, escalating privileges to critical systems.
d) Persistence & Evasion: Maintaining long-term, stealthy access via backdoors
and Living-off-the-Land techniques to avoid detection.
Defensive Architectures and Intelligent Cybersecurity Systems

  1. Explainable Autonomic Cybersecurity Systems for Power Grids and Real-World
    Attack Scenarios
    Cyberattacks on the energy sector have demonstrated the urgent need for realistic threat
    modeling and advanced defense systems. Notable incidents include the 2015 BlackEnergy attack
    on Ukraine, which caused widespread blackouts, and subsequent 2022 GRU-linked cyberattacks.
    Historical examples like the 2013 Dragonfly and Energetic Bear campaigns further underscore
    persistent threats. To counter such risks, autonomic cybersecurity systems leveraging machine
    learning (ML) have emerged, evolving from basic classifiers to deep learning and multi-view
    federated learning (MV-FLID) models. However, the lack of explainability in these systems
    limits their effectiveness. Addressing this, explainable ML models have been developed to
    provide transparent and interpretable decisions, particularly vital in time-sensitive infrastructure
    like power grids. Substations of critical grid nodes remain vulnerable, as shown in attacks like
    the Moore County incident and the 2014 FERC study, which warned that disabling just nine
    substations could cripple the U.S. grid. Common attack scenarios include internal vulnerability
    scans, brute-force attacks, malware deployment, and disabling systems or logging services
    through advanced methods like DoS or fileless attacks (Explainable autonomic cybersecurity
    system for smart power grid, 2024).

Software Vulnerabilities and Memory Exploits

  1. Memory Safety Vulnerabilities: A Persistent Threat to Critical Infrastructure Security
    Memory safety vulnerabilities occur when programs unintentionally access or modify memory,
    leading to issues like data corruption, crashes, or remote code execution. These flaws are
    especially common in languages such as C and C++ that lack built-in memory safety features.
    Attackers often exploit these vulnerabilities to target critical infrastructure, including medical
    devices, aviation systems, defense networks, and industrial control systems (ICS). Addressing
    memory vulnerabilities is crucial because they make up a large portion of software-based attacks.
    Notably, ICS-related memory safety CVEs have surged from fewer than 1,000 in 2014 to nearly
    3,000 in 2023 (Spewak, 2025).
    Key Memory Safety Vulnerabilities (As per CWE Top 25 – 2024) (Spewak, 2025)

Type CWE ID Description Real-World Example

Buffer Overflow CWE-119

Writing more data to a buffer than it
can hold, corrupting memory.

CVE-2023-4966
(CitrixBleed): Bypassed
authentication in Citrix
systems, leading to
ransomware attacks
(e.g., Boeing).

Heap-Based
Buffer Overflow CWE-122

Overflow in heap memory, leading to
memory corruption and remote code
execution.

CVE-2024-38812:
Affected VMware
vCenter; exploited via
DCERPC protocol
during Matrix Cup
2024.

Use-After-Free
(UAF) CWE-416

Accessing memory after it’s freed,
causing crashes or code execution.

CVE-2021-44710:
Affected Adobe
Acrobat Reader DC,
enabling arbitrary code
execution.

Out-of-Bounds
Write CWE-787

Writing data outside allocated buffer
boundaries.

CVE-2024-7695: Hit
Moxa PT switch series,
enabling

unauthenticated denial-
of-service attacks.

Improper Input
Validation CWE-020

Failing to validate inputs, leading to
injection or unauthorized actions.

CVE-2024-5913: PAN-
OS flaw allowing

privilege escalation via
file system access.

Integer
Overflow/Wrapa
round CWE-190

Arithmetic overflows exceeding data
type limits, causing crashes or
security bypasses.

CVE-2022-2329: In
Schneider Electric’s
IGSS; exploited to
trigger heap-based
buffer overflow and
remote RCE.

Memory CVEs Impacting Critical Infrastructure (Spewak, 2025)

System / Product Vulnerability Impact
Ivanti Connect
Secure CVE-2025-0282

Zero-day allowing remote code execution and
malware deployment.

Siemens UMC
(ICS) CVE-2024-49775

Heap-buffer overflow leading to arbitrary code
execution.

Mercedes-Benz
Infotainment Multiple CVEs

Attackers could bypass anti-theft, escalate
privileges, compromise data.

Rockwell
PowerMonitor
1000 CVE-2024-12372

Heap overflow resulting in denial-of-service and
potential RCE.

The key risks include full system hijacking through remote exploits, data breaches involving
theft or corruption, operational disruptions due to instability, and compliance failures that can
result in legal consequences (Spewak, 2025).

  1. Eliminating Memory Safety Vulnerabilities: A Strategic Imperative for Software
    Security
    A joint report by U.S. and international cyber agencies emphasizes the urgent need for software
    manufacturers to eliminate memory safety vulnerabilities, a longstanding class of software
    defects responsible for most serious security flaws. Despite efforts like memory randomization,
    sandboxing, and developer training, these issues continue to dominate CVE reports from major
    tech firms such as Microsoft, Google, and Mozilla, leading to zero-day exploits and spyware
    attacks against civil society groups. The report advocates for a shift toward memory safe
    programming languages like Rust, which inherently prevent such vulnerabilities. Aligned with
    CISA’s “Secure by Design” principles, the report urges companies to take executive ownership
    of customer security, embrace radical transparency, and implement hardware-based mitigations
    such as CHERI and MTE. The overarching message is clear: software makers must act
    decisively now to avoid extending these risks into the future (Lord, 2023).
    Hardware-Based Attacks on Emerging Platforms
  2. Rowhammer and the Limits of ECC Memory: Exploiting Vulnerabilities in Modern
    DRAM Systems
    As transistor sizes shrink, their reliability deteriorates, leading to increased charge leakage in
    DRAM cells due to parasitic coupling and passing gate effects. This vulnerability, known as
    Rowhammer, was first demonstrated by Y. Kim, R. Daly, J. Kim, C. Fallin, J. H. Lee, D. Lee, C.
    Wilkerson, K. Lai, and O. Mutlu, “Flipping Bits in Memory Without Accessing Them: An
    Experimental Study of DRAM Disturbance Errors,” ISCA’ 14, who showed that repeatedly
    activating a DRAM row can cause unintended bit flips in adjacent rows. Since then, various
    Rowhammer attack techniques, such as double-sided, single-sided, and one-location
    Rowhammer have exploited this behavior to compromise desktops, laptops, and mobile phones.
    These attacks targeted all systems without ECC (Error-Correcting Code) memory, as ECC has
    long been considered one of the few viable hardware defenses against Rowhammer. However,
    speculation has persisted that even ECC could be bypassed, though no end-to-end Rowhammer
    attack on real ECC memory had been achieved, largely due to two barriers: the undocumented
    and often complex nature of ECC implementations in modern systems, and the technical
    difficulty of inducing bit flips without triggering ECC corrections or system crashes.

To overcome these challenges, researchers in Exploiting Correcting Codes: On the Effectiveness
of ECC Memory Against Rowhammer Attacks (2019) introduced a novel methodology. They
reverse-engineered ECC functions in commodity AMD and Intel systems using a combination of
custom hardware probes, Rowhammer-induced bit flips, and cold boot attacks. They also
developed a new exploit called ECCploit, which uses composable, data-controlled bit flips and a
novel side channel in the ECC memory controller. The study demonstrates that while ECC does
reduce the feasibility of Rowhammer attacks, it does not eliminate the risk. ECCploit
successfully mounted reliable attacks on ECC-protected memory across various systems and
configurations, proving that even advanced memory protection mechanisms can be
compromised. This work significantly advances understanding of ECC’s limitations and shows
that Rowhammer remains a practical and powerful threat, even in environments previously
considered secure (Exploiting Correcting codes: on the effectiveness of ECC memory against
Rowhammer attacks, 2019).
GPUHammer: First Successful Rowhammer Attack on NVIDIA GPUs Reveals Critical AI
and Shared GPU Security Risks
Researchers from the University of Toronto have demonstrated the first successful Rowhammer
bit-flip attack on GPU memory, targeting GDDR6 memory in Nvidia A6000 GPUs. The attack,
dubbed “GPUHammer,” exploits repeated access to adjacent memory rows using user-level
CUDA code to induce bit flips across all tested DRAM banks, bypassing in-DRAM defenses like
Target Row Refresh (TRR). This enables a malicious user to tamper with another user’s data in
shared GPU environments. In a proof-of-concept, a single bit flip was enough to degrade a
victim’s deep neural network (DNN) model accuracy from 80% to 0.1%. Rowhammer attacks,
which rapidly access specific memory rows to cause data corruption in adjacent rows, were
previously associated only with CPU DRAM. This breakthrough exposes new vulnerabilities for
AI systems that rely on shared GPU resources. In response, Nvidia issued a security notice
recommending that users enable System-Level ECC (Error-Correcting Code), which corrects

flipped bits automatically, and advised enterprise users to rely on professional or data center-
grade GPUs like the Hopper and Blackwell classes, where ECC is enabled by default. The

feasibility of Rowhammer attacks is largely limited to multi-tenant environments with
simultaneous GPU access (Mishra, 2025; MSN, n.d.).
Cryptographic Integrity and Secure Computation

  1. Integrity Challenges in Fully Homomorphic Encryption: Gaps Between Theory and
    Practice
    Fully Homomorphic Encryption (FHE) enables computation on encrypted data but remains
    vulnerable to integrity risks due to its malleable ciphertexts. While traditionally used under an
    honest-but-curious server model, real-world applications like Microsoft Edge Password Monitor,
    demand stronger protections. Existing defenses, such as verifiable computation or IND-CCA1-
    secure schemes, are either impractical or inefficient, leaving a gap between current FHE use and
    robust integrity guarantees (Knabenhans, 2023).
    Geopolitical Supply Chain Dependencies
  2. Taiwan’s Semiconductor Supremacy and China’s Race to Close the Gap
    Taiwan produces over 60% of the world’s semiconductors and over 90% of the most advanced
    ones. Most are manufactured by a single company, Taiwan Semiconductor Manufacturing
    Corporation (TSMC). Until now, the most advanced have been made only in Taiwan (The
    Economist, 2023).
    TSMC manufactures an estimated 92% of the world’s most advanced semiconductor chips,
    powering essential technologies like smartphones, laptops, and AI tools such as ChatGPT. Major
    tech companies, including Apple, Nvidia, and Tesla, rely heavily on TSMC for chip production.
    As historian Chris Miller noted, nearly a third of global computing power is fabricated in
    Taiwan, underscoring TSMC’s critical role in the tech ecosystem. Following a 7.4 magnitude
    earthquake off Taiwan’s east coast, chip production at TSMC’s west coast factories was briefly
    paused. (Allyn, 2024).
    China’s semiconductor industry sits several generations behind the leading edge of innovation.
    Massive investments are required to close that gap, particularly in chip manufacturing. Chinese
    companies have attempted to acquire foreign leading-edge technology through forced technology
    transfer agreements, intellectual property theft, and talent poaching. However, China’s efforts to
    acquire know-how from abroad have so far failed to spark genuine domestic innovation. Instead,
    MCF and semiconductor efforts have found some positive synergy by applying defense
    procurement spending to prop-up China’s fledgling semiconductor companies that are globally
    uncompetitive but key to the PLA’s defense needs. Rather than spin on or spin off, MCF is
    helping domestic semiconductor firms step up (How Military-Civil Fusion Steps up China’s
    Semiconductor Industry – DigiChina, 2022).
    Strategic Outlook Moving Forward
    In the near term, enhancing electricity security involves implementing innovative solutions such
    as microgrids, which are self-sufficient systems ideal for localized areas like campuses or
    neighborhoods and can be powered by renewables to reduce emissions. Smart grids with sensors
    improve stability and outage information, while grid hardening measures like burying lines or
    using steel poles fortify infrastructure. Federal support is essential for recovery and resilience,
    alongside AI-driven monitoring and zero-trust cybersecurity architectures. The Salt Typhoon
    attack underscored the need for unity and innovation, especially as traditional frameworks like
    DHS committees dissolve. Meanwhile, NVIDIA advises enabling SYS-ECC (and OD-ECC
    where available) across GPU product lines to mitigate Rowhammer-style attacks like
    GPUHammer, particularly in multi-tenant and data center settings. Static defenses are

increasingly inadequate, which is why Deep Reinforcement Learning methods like Deep Q-
Networks (DQN) are being adopted to detect complex threats such as False Data Injection

Attacks (FDIA), classified by duration and intensity. These attacks evade conventional detection,
so real-time adaptive strategies and monitoring voltage drop rates across grid nodes are now key,
with load shedding prioritized in areas showing steep declines to help stabilize the system.

References

Allyn, B. (2024, April 3). Taiwan earthquake briefly halts chip factories that power the global economy.

NPR. https://www.npr.org/2024/04/03/1242564161/taiwan-earthquake-semiconductor-chips-
tech

Arianos, S., Bompard, E., Carbone, A., Xue, F., Dipartimento di Ingegneria Elettrica, Politecnico di
Torino, & Dipartimento di Fisica, Politecnico di Torino. (2009). Power grids vulnerability: a
complex network approach. https://arxiv.org/pdf/0810.5278
Detection of false data injection attacks in smart-grid systems. (2015, February 1). IEEE Journals &
Magazine | IEEE Xplore. https://ieeexplore.ieee.org/document/7045410
Explainable autonomic cybersecurity system for smart power grid. (2024, September 30). IEEE
Conference Publication | IEEE Xplore. https://ieeexplore.ieee.org/document/10735649
Exploiting Correcting codes: on the effectiveness of ECC memory against Rowhammer attacks. (2019,
May 1). IEEE Conference Publication | IEEE Xplore.
https://ieeexplore.ieee.org/document/8835222
Forsecout Researcher. (2025). SUN:DOWN Destablizing the Grid via Orchestrated Exploitation of
Solar Power System. https://www.forescout.com/resources/sun-down-research-report/
How Military-Civil fusion steps up China’s semiconductor industry – DigiChina. (2022, April 1).

DigiChina. https://digichina.stanford.edu/work/how-military-civil-fusion-helps-chinas-
semiconductor-industry-step-up/

Knabenhans, C. (2023, April 23). Verifiable fully homomorphic encryption. Christian Knabenhans.
https://cknabs.github.io/post/vfhe/
Kovacs, E. (2025, February). Nine Threat Groups Active in OT Operations in 2024: Dragos.

SECURITYWEEK NETWORK. https://www.securityweek.com/nine-threat-groups-active-in-ot-
operations-in-2024-dragos

Kovacs, E. (2025, March). China’s Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days.

SECURITYWEEK NETWORK. https://www.securityweek.com/chinas-volt-typhoon-hackers-
dwelled-in-us-electric-grid-for-300-days/

Lakshminarayana, S., Chen, Y., Maple, C., Larkins, A., Flack, D., Few, C., David, K.-A., & Srivastava,
Anurag. K. (2025, February). Cybersecurity Threats to Power Grid Operations from the
Demand-Side Response Ecosystem. https://arxiv.org/pdf/2310.18820
Lin, X., An, D., Cui, F., & Zhang, F. (2023). False data injection attack in smart grid: Attack model and
reinforcement learning-based detection method. Frontiers in Energy Research, 10.
https://doi.org/10.3389/fenrg.2022.1104989

Lord, B. (2023, December). The Urgent Need for Memory Safety in Software Products.
https://www.cisa.gov/news-events/news/urgent-need-memory-safety-software-products
Mcfarlane, S. & Reuters. (2025, May 14). Rogue communication devices found in Chinese solar power

inverters. Reuters. https://www.reuters.com/sustainability/climate-energy/ghost-machine-rogue-
communication-devices-found-chinese-inverters-2025-05-14/

Mishra, A. (2025, July 12). GPUHammer: First-Ever Rowhammer attack targeting NVIDIA GPUs.
GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
https://gbhackers.com/first-ever-rowhammer-attack-targeting-nvidia-gpus/#google_vignette

MSN. (n.d.). https://www.msn.com/en-in/technology/hardware-and-devices/nvidia-chips-hacked-fall-
victim-to-rowhammer-bit-flip-attacks-here-s-how-to-secure-the-ai-gpus/ar-
AA1IIktn?ocid=BingNewsVerp

Sande-Ríos, J., Canal-Sánchez, J., Manzano-Hernandez, C., & Pastrana, S. (2024). Threat analysis and
adversarial model for Smart Grids. https://arxiv.org/html/2406.11716v1
Shekari, T., Cardenas, A. A., & Beyah, R. (2022). {MADIOT} 2.0: Modern {High-Wattage} {IoT} botnet
attacks and defenses. https://www.usenix.org/conference/usenixsecurity22/presentation/shekari
Spewak, N. (2025, June 6). Types of Memory Safety Vulnerabilities & How to Address Them. RunSafe
Security. https://runsafesecurity.com/blog/memory-safety-vulnerabilities/

The Economist. (2023, March 6). Taiwan’s dominance of the chip industry makes it more important.

The Economist. https://www.economist.com/special-report/2023/03/06/taiwans-dominance-of-
the-chip-industry-makes-it-more-important

Ayushi Kapoor