The poor security controls around the way the sensors transmit data were detailed in a presentation at the Def Con hacker convention.
Researchers found ways to fool and overload sensors so monitoring systems would get wildly inaccurate readings.
The findings have been reported to the US computer emergency organisation that oversees national infrastructure. Nanometrics, the company that makes the sensor system that was probed disputed the researchers' findings.
Last November, Synopsys security researcher Ian Haken demonstrated how it would be possible to bypass Windows authentication and even BitLocker encryption on devices to which he had physical access.
The attack routine he described involved taking a computer out of the enterprise network it was assigned to and away from its original domain controller.
On Thursday, a program called Mayhem, created by a Carnegie Mellon team, won the $2 million first prize in the Cyber Grand Challenge, the latest in a series of technology competitions sponsored by the Defense Advanced Research Projects Agency, or DARPA.
L33tdawg: Somewhat similar to Antonios Chariton's Exploiting Passbook talk from #HITB2014AMS
Przemek Jaroszewski, head of Poland’s chapter of the international Computer Emergency Readiness Team program, was scheduled to present what was likely one of the more basic but frightening hacks at this week’s Defcon conference in Las Vegas—an Android app that generates fake boarding passes.
Anti-virus software is often used to mitigate all sorts of attacks levied against computers, but what about their displays? Turns out, those can be manipulated in much the same manner as a pair of security researchers have demonstrated.