DocumentCode :
1487729
Title :
Lessons from Stuxnet
Author :
Chen, Thomas M. ; Abu-Nimeh, Saeed
Author_Institution :
Swansea Univ., Swansea, UK
Volume :
44
Issue :
4
fYear :
2011
fDate :
4/1/2011 12:00:00 AM
Firstpage :
91
Lastpage :
93
Abstract :
The article mentions that the malware such as Stuxnet can affect critical physical infrastructures that are controlled by software, which implies that threats might extend to real lives. Stuxnet differs from past malware in several ways. First, most malware tries to infect as many computers as possible, whereas Stuxnet appears to target industrial control systems and delivers its pay load under very specific conditions. Second, Stuxnet is larger and more complex than other malware. It cotains exploits for four vulnerabilities.
Keywords :
industrial control; invasive software; production engineering computing; Stuxnet; industrial control systems; malware; physical infrastructures; Electronic mail; Malware; Servers; Software; Malware; Security; Stuxnet;
fLanguage :
English
Journal_Title :
Computer
Publisher :
ieee
ISSN :
0018-9162
Type :
jour
DOI :
10.1109/MC.2011.115
Filename :
5742014
Link To Document :
بازگشت