The Experts below are selected from a list of 1803 Experts worldwide ranked by ideXlab platform
François Karch - One of the best experts on this subject based on the ideXlab platform.
-
Stuxnet Recruits the Proteasome to Take Down Polycomb.
Developmental cell, 2016Co-Authors: François KarchAbstract:In this issue of Developmental Cell, Du et al. (2016) describe a gene named Stuxnet that regulates Polycomb protein stability, thereby influencing the activity of the Polycomb-group repressive chromatin complexes.
Muhammad Asif Zahoor Raja - One of the best experts on this subject based on the ideXlab platform.
-
Design of a mathematical model for the Stuxnet virus in a network of critical control infrastructure
Computers & Security, 2019Co-Authors: Zaheer Masood, Raza Samar, Muhammad Asif Zahoor RajaAbstract:Abstract The purpose of this study is to develop an epidemic virus model that portrays the spread of the Stuxnet virus in a critical control infrastructure after bridging the air-gap between a normal local area network and the critical network. Removable storage media plays an important role in the transfer of data and virus to the computers connected to the critical network (consisting of industrial controllers) and this can compromise the whole system. A mathematical model is formulated that incorporates these features and depicts the controlling mechanism. Disease free and endemic equilibria are analyzed in terms of the basic reproduction number R0. Global stability of disease free and endemic equilibrium points are analyzed using Lyapunov functions. Numerical simulations are performed to determine the accuracy of the proposed model for the smart Stuxnet virus which is designed to target critical industrial systems. Model shows very good resemblance with the observed real life data available for this virus. Future work may invoke interesting results and control strategies.
Ludovic Pietre-cambacedes - One of the best experts on this subject based on the ideXlab platform.
-
Modeling the Stuxnet attack with BDMP: Towards more formal risk assessments
2016Co-Authors: Siwar Kriaa, Marc Bouissou, Ludovic Pietre-cambacedesAbstract:Attack modeling has recently been adopted by security analysts as a useful tool in risk assessment of cyber-physical systems. We propose in this paper to model the Stuxnet attack with BDMP (Boolean logic Driven Markov Processes) formalism and to show the advantages of such modeling. After a description of the architecture targeted by Stuxnet, we explain the steps of the attack and model them formally with a BDMP. Based on estimated values of the success probabilities and rates of the elementary attack steps, we give a quantification of the main possible sequences leading to the physical destruction of the targeted industrial facility. This example completes a series of papers on BDMP applied to security by modeling a real case study. It highlights the advantages of BDMP compared to attack trees often used in security assessment.
-
CRiSIS - Modeling the Stuxnet attack with BDMP: Towards more formal risk assessments
2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS), 2012Co-Authors: Siwar Kriaa, Marc Bouissou, Ludovic Pietre-cambacedesAbstract:Attack modeling has recently been adopted by security analysts as a useful tool in risk assessment of cyber-physical systems. We propose in this paper to model the Stuxnet attack with BDMP (Boolean logic Driven Markov Processes) formalism and to show the advantages of such modeling. After a description of the architecture targeted by Stuxnet, we explain the steps of the attack and model them formally with a BDMP. Based on estimated values of the success probabilities and rates of the elementary attack steps, we give a quantification of the main possible sequences leading to the physical destruction of the targeted industrial facility. This example completes a series of papers on BDMP applied to security by modeling a real case study. It highlights the advantages of BDMP compared to attack trees often used in security assessment.
Zaheer Masood - One of the best experts on this subject based on the ideXlab platform.
-
Design of a mathematical model for the Stuxnet virus in a network of critical control infrastructure
Computers & Security, 2019Co-Authors: Zaheer Masood, Raza Samar, Muhammad Asif Zahoor RajaAbstract:Abstract The purpose of this study is to develop an epidemic virus model that portrays the spread of the Stuxnet virus in a critical control infrastructure after bridging the air-gap between a normal local area network and the critical network. Removable storage media plays an important role in the transfer of data and virus to the computers connected to the critical network (consisting of industrial controllers) and this can compromise the whole system. A mathematical model is formulated that incorporates these features and depicts the controlling mechanism. Disease free and endemic equilibria are analyzed in terms of the basic reproduction number R0. Global stability of disease free and endemic equilibrium points are analyzed using Lyapunov functions. Numerical simulations are performed to determine the accuracy of the proposed model for the smart Stuxnet virus which is designed to target critical industrial systems. Model shows very good resemblance with the observed real life data available for this virus. Future work may invoke interesting results and control strategies.
Ryan Jenkins - One of the best experts on this subject based on the ideXlab platform.
-
IS Stuxnet PHYSICAL? DOES IT MATTER?
Journal of Military Ethics, 2013Co-Authors: Ryan JenkinsAbstract:Cyber-weapons are software and software, at least intuitively, is non-physical. Several authors have noted that this potentially renders problematic the application of normative frameworks like UN Charter Article 2(4) to cyber-weapons. If Article 2(4) only proscribes the use of physical force, and if cyber-weapons are non-physical, then cyber-weapons fall outside the purview of Article 2(4). This article explores the physicality of software, examining Stuxnet in particular. First, I show that with a few relatively uncontroversial metaphysical claims we can secure the conclusion that Stuxnet is physical. In particular, there exist instances of Stuxnet that are both located in space and causally efficacious, and this is very strong evidence for their being physical. Second, I argue that the question of physicality is actually irrelevant for the moral evaluation of an attack like Stuxnet because of its undeniably physical effects. Finally, I argue that some features of Stuxnet should make us optimistic about...