Stuxnet Vulnerabilities Analysis of SCADA Systems

被引:0
作者
Wang, Yong [1 ]
Gu, Dawu [2 ]
Peng, DaoGang [1 ]
Chen, Shuai [1 ]
Yang, Heng [1 ]
机构
[1] Shanghai Univ Elect Power, Dept Comp Sci & Technol, 2103 Pingliang Rd, Shanghai 200090, Yangpu District, Peoples R China
[2] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
来源
NETWORK COMPUTING AND INFORMATION SECURITY | 2012年 / 345卷
基金
上海市自然科学基金;
关键词
Stuxnet; Vulnerability; CVE; SCADA;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Stuxnet virus is a first discovered malware to damage nuclear power station in June 2010 and targets only Siemens supervisory control and data acquisition (SCADA) system via vulnerabilities. Through the static reverse and dynamic analysis of Stuxnet malware tiles, we researched on MS10-046 (CVE-2010-2772) shortcut vulnerability, MS10-061 (CVE-2010-2729) in print spooler service vulnerability and MS10-073 (CVE-2010-2743) keyboard layout elevation of privilege vulnerability. The paper illustrated internal details and the Stuxnet implemented methods.
引用
收藏
页码:640 / +
页数:2
相关论文
共 50 条
  • [41] Cyber-physical Threats and Vulnerabilities Analysis for Train Control and Monitoring Systems
    Rekik, Mouna
    Gransart, Christophe
    Berbineau, Marion
    [J]. 2018 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC 2018), 2018,
  • [42] Mapping and Analysis of Common Vulnerabilities in Popular Web Servers
    Barocsai, Matyas
    Can, Johan
    Karresand, Martin
    Nadjm-Tehrani, Simin
    [J]. CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2023, 2024, 14599 : 3 - 22
  • [43] A survey of cybersecurity vulnerabilities in healthcare systems
    Alodaynan, Abdullah Mohammed
    Alanazi, Adwan Alownie
    [J]. INTERNATIONAL JOURNAL OF ADVANCED AND APPLIED SCIENCES, 2021, 8 (12): : 48 - 55
  • [44] On Privacy Weaknesses and Vulnerabilities in Software Systems
    Sangaroonsilp, Pattaraporn
    Dam, Hoa Khanh
    Ghose, Aditya
    [J]. 2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ICSE, 2023, : 1071 - 1083
  • [45] Monitoring Software Vulnerabilities through Social Networks Analysis
    Trabelsi, Slim
    Plate, Henrik
    Abida, Amine
    Ben Aoun, M. Marouane
    Zouaoui, Anis
    Missaoui, Chedy
    Gharbi, Sofien
    Ayari, Alaeddine
    [J]. 2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, 2015, : 236 - 242
  • [46] Vulnerabilities of Industrial Control Systems Outside
    Sergey, Mezin, V
    Alexander, Mayantsev, V
    Anatoly, Kosoy A.
    [J]. 2018 RENEWABLE ENERGIES, POWER SYSTEMS & GREEN INCLUSIVE ECONOMY (REPS-GIE), 2018,
  • [47] Secure Communication Protocols for SCADA Systems: Analysis and Comparisons of Different Secure Communication Protocols
    Aboulsamh, Rana Mohammed
    Albugaey, Maryam Tariq
    Alghamdi, Dana Omar
    Abujaid, Fatima Hussain
    Alsubaie, Sarah Nasser
    Saqib, Nazar Abbas
    [J]. PROCEEDINGS 2024 SEVENTH INTERNATIONAL WOMEN IN DATA SCIENCE CONFERENCE AT PRINCE SULTAN UNIVERSITY, WIDS-PSU 2024, 2024, : 209 - 214
  • [48] Cloud Computing Vulnerabilities Analysis
    Zamfiroiu, Alin
    Petre, Ionut
    Boncea, Radu
    [J]. 2019 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTERNET OF THINGS (CCIOT 2019), 2019, : 48 - 53
  • [49] Cyber Security Modeling for SCADA Systems Using Stochastic Game Nets Approach
    El Bouchti, Abdelali
    Nahhal, Tarik
    [J]. 2016 FIFTH INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATION TECHNOLOGIES (FGCT), 2016, : 42 - 47
  • [50] Analysis of Security Vulnerabilities and Countermeasures
    Son, Hyun-Min
    Joo, Nak-Keun
    Choi, Hyun-Taek
    Lee, Hyun-Cheol
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (02): : 200 - 206