A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet

被引:107
作者
Nourian, Arash [1 ]
Madnick, Stuart [1 ]
机构
[1] MIT, 77 Massachusetts Ave, Cambridge, MA 02139 USA
关键词
CPS security design; stuxnet analysis; CPS; STAMP; security and safety analysis; FAILURE MODES; SAFETY;
D O I
10.1109/TDSC.2015.2509994
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber physical systems (CPSs) are increasingly being adopted in a wide range of industries such as smart power grids. Even though the rapid proliferation of CPSs brings huge benefits to our society, it also provides potential attackers with many new opportunities to affect the physical world such as disrupting the services controlled by CPSs. Stuxnet is an example of such an attack that was designed to interrupt the Iranian nuclear program. In this paper, we show how the vulnerabilities exploited by Stuxnet could have been addressed at the design level. We utilize a system theoretic approach, based on prior research on system safety, that takes both physical and cyber components into account to analyze the threats exploited by Stuxnet. We conclude that such an approach is capable of identifying cyber threats towards CPSs at the design level and provide practical recommendations that CPS designers can utilize to design a more secure CPS.
引用
收藏
页码:2 / 13
页数:12
相关论文
共 40 条
[1]   Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks [J].
Amin, Saurabh ;
Litrico, Xavier ;
Sastry, Shankar ;
Bayen, Alexandre M. .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) :1963-1970
[2]  
[Anonymous], 2011, W32.Stuxnet Dossier
[3]  
[Anonymous], 2014, CYBER PHYS SYSTEMS
[4]  
[Anonymous], 2002, VTT IND SYSTEMS STUK
[5]  
[Anonymous], 2014, PLANES ARE RISK CYBE
[6]  
[Anonymous], 2007, C VULNERABILITY ASSE
[7]  
[Anonymous], 2011, GUIDE IND CONTROL SY
[8]  
[Anonymous], 2012, STUXNET EXPERT ANAL
[9]  
[Anonymous], 2011, P 6 ACM S INF COMP C, DOI DOI 10.1145/1966913.1966959
[10]  
[Anonymous], 1981, Fault Tree Handbook