Stuxnet Vulnerabilities Analysis of SCADA Systems

被引:0
|
作者
Wang, Yong [1 ]
Gu, Dawu [2 ]
Peng, DaoGang [1 ]
Chen, Shuai [1 ]
Yang, Heng [1 ]
机构
[1] Shanghai Univ Elect Power, Dept Comp Sci & Technol, 2103 Pingliang Rd, Shanghai 200090, Yangpu District, Peoples R China
[2] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
基金
上海市自然科学基金;
关键词
Stuxnet; Vulnerability; CVE; SCADA;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Stuxnet virus is a first discovered malware to damage nuclear power station in June 2010 and targets only Siemens supervisory control and data acquisition (SCADA) system via vulnerabilities. Through the static reverse and dynamic analysis of Stuxnet malware tiles, we researched on MS10-046 (CVE-2010-2772) shortcut vulnerability, MS10-061 (CVE-2010-2729) in print spooler service vulnerability and MS10-073 (CVE-2010-2743) keyboard layout elevation of privilege vulnerability. The paper illustrated internal details and the Stuxnet implemented methods.
引用
收藏
页码:640 / +
页数:2
相关论文
共 50 条
  • [31] SCADA vulnerabilities and attacks: A review of the state-of-the-art and open issues
    Alanazi, Manar
    Mahmood, Abdun
    Chowdhury, Mohammad Jabed Morshed
    COMPUTERS & SECURITY, 2023, 125
  • [32] Identifying SCADA Vulnerabilities Using Passive and Active Vulnerability Assessment Techniques
    Samtani, Sagar
    Yu, Shuo
    Zhu, Hongyi
    Patton, Mark
    Chen, Hsinchun
    IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 25 - 30
  • [33] Exploiting Vulnerabilities in the SCADA Modbus Protocol: An ICT-Reliant Perspective
    Sinha, Ayush
    Patel, Saurabh Singh
    Kumar, Abhishek
    Vyas, O. P.
    ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2021, 2022, 1534 : 94 - 108
  • [34] Analysis of Vulnerabilities in Radio Frequency Identification (RFID) Systems
    Jain, Rajat
    Chaudhary, Dev Kumar
    Kumar, Sanjiv
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 453 - 457
  • [35] Security analysis of vulnerabilities and threats for medical information systems
    Ju, Tea Kyung
    Hong, Chong Min
    Shin, Weon
    ICIC Express Letters, 2015, 9 (03): : 849 - 854
  • [36] Systems analysis of intracellular pH vulnerabilities for cancer therapy
    Persi, Erez
    Duran-Frigola, Miguel
    Damaghi, Mehdi
    Roush, William R.
    Aloy, Patrick
    Cleveland, John L.
    Gillies, Robert J.
    Ruppin, Eytan
    NATURE COMMUNICATIONS, 2018, 9
  • [37] Systems analysis of intracellular pH vulnerabilities for cancer therapy
    Erez Persi
    Miquel Duran-Frigola
    Mehdi Damaghi
    William R. Roush
    Patrick Aloy
    John L. Cleveland
    Robert J. Gillies
    Eytan Ruppin
    Nature Communications, 9
  • [38] SPECIFYING SCADA SYSTEMS
    RIDGEWAY, DG
    POWER ENGINEERING, 1973, 77 (02) : 42 - 43
  • [39] The validation of SCADA systems
    Coady, PJ
    MEASUREMENT & CONTROL, 1998, 31 (01): : 14 - 19
  • [40] SCADA SYSTEMS ARE EVOLVING
    MEADOWS, T
    CONTROL AND INSTRUMENTATION, 1990, 22 (10): : 65 - &