Stuxnet

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 1803 Experts worldwide ranked by ideXlab platform

François Karch - One of the best experts on this subject based on the ideXlab platform.

Muhammad Asif Zahoor Raja - One of the best experts on this subject based on the ideXlab platform.

  • Design of a mathematical model for the Stuxnet virus in a network of critical control infrastructure
    Computers & Security, 2019
    Co-Authors: Zaheer Masood, Raza Samar, Muhammad Asif Zahoor Raja
    Abstract:

    Abstract The purpose of this study is to develop an epidemic virus model that portrays the spread of the Stuxnet virus in a critical control infrastructure after bridging the air-gap between a normal local area network and the critical network. Removable storage media plays an important role in the transfer of data and virus to the computers connected to the critical network (consisting of industrial controllers) and this can compromise the whole system. A mathematical model is formulated that incorporates these features and depicts the controlling mechanism. Disease free and endemic equilibria are analyzed in terms of the basic reproduction number R0. Global stability of disease free and endemic equilibrium points are analyzed using Lyapunov functions. Numerical simulations are performed to determine the accuracy of the proposed model for the smart Stuxnet virus which is designed to target critical industrial systems. Model shows very good resemblance with the observed real life data available for this virus. Future work may invoke interesting results and control strategies.

Ludovic Pietre-cambacedes - One of the best experts on this subject based on the ideXlab platform.

  • Modeling the Stuxnet attack with BDMP: Towards more formal risk assessments
    2016
    Co-Authors: Siwar Kriaa, Marc Bouissou, Ludovic Pietre-cambacedes
    Abstract:

    Attack modeling has recently been adopted by security analysts as a useful tool in risk assessment of cyber-physical systems. We propose in this paper to model the Stuxnet attack with BDMP (Boolean logic Driven Markov Processes) formalism and to show the advantages of such modeling. After a description of the architecture targeted by Stuxnet, we explain the steps of the attack and model them formally with a BDMP. Based on estimated values of the success probabilities and rates of the elementary attack steps, we give a quantification of the main possible sequences leading to the physical destruction of the targeted industrial facility. This example completes a series of papers on BDMP applied to security by modeling a real case study. It highlights the advantages of BDMP compared to attack trees often used in security assessment.

  • CRiSIS - Modeling the Stuxnet attack with BDMP: Towards more formal risk assessments
    2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS), 2012
    Co-Authors: Siwar Kriaa, Marc Bouissou, Ludovic Pietre-cambacedes
    Abstract:

    Attack modeling has recently been adopted by security analysts as a useful tool in risk assessment of cyber-physical systems. We propose in this paper to model the Stuxnet attack with BDMP (Boolean logic Driven Markov Processes) formalism and to show the advantages of such modeling. After a description of the architecture targeted by Stuxnet, we explain the steps of the attack and model them formally with a BDMP. Based on estimated values of the success probabilities and rates of the elementary attack steps, we give a quantification of the main possible sequences leading to the physical destruction of the targeted industrial facility. This example completes a series of papers on BDMP applied to security by modeling a real case study. It highlights the advantages of BDMP compared to attack trees often used in security assessment.

Zaheer Masood - One of the best experts on this subject based on the ideXlab platform.

  • Design of a mathematical model for the Stuxnet virus in a network of critical control infrastructure
    Computers & Security, 2019
    Co-Authors: Zaheer Masood, Raza Samar, Muhammad Asif Zahoor Raja
    Abstract:

    Abstract The purpose of this study is to develop an epidemic virus model that portrays the spread of the Stuxnet virus in a critical control infrastructure after bridging the air-gap between a normal local area network and the critical network. Removable storage media plays an important role in the transfer of data and virus to the computers connected to the critical network (consisting of industrial controllers) and this can compromise the whole system. A mathematical model is formulated that incorporates these features and depicts the controlling mechanism. Disease free and endemic equilibria are analyzed in terms of the basic reproduction number R0. Global stability of disease free and endemic equilibrium points are analyzed using Lyapunov functions. Numerical simulations are performed to determine the accuracy of the proposed model for the smart Stuxnet virus which is designed to target critical industrial systems. Model shows very good resemblance with the observed real life data available for this virus. Future work may invoke interesting results and control strategies.

Ryan Jenkins - One of the best experts on this subject based on the ideXlab platform.

  • IS Stuxnet PHYSICAL? DOES IT MATTER?
    Journal of Military Ethics, 2013
    Co-Authors: Ryan Jenkins
    Abstract:

    Cyber-weapons are software and software, at least intuitively, is non-physical. Several authors have noted that this potentially renders problematic the application of normative frameworks like UN Charter Article 2(4) to cyber-weapons. If Article 2(4) only proscribes the use of physical force, and if cyber-weapons are non-physical, then cyber-weapons fall outside the purview of Article 2(4). This article explores the physicality of software, examining Stuxnet in particular. First, I show that with a few relatively uncontroversial metaphysical claims we can secure the conclusion that Stuxnet is physical. In particular, there exist instances of Stuxnet that are both located in space and causally efficacious, and this is very strong evidence for their being physical. Second, I argue that the question of physicality is actually irrelevant for the moral evaluation of an attack like Stuxnet because of its undeniably physical effects. Finally, I argue that some features of Stuxnet should make us optimistic about...