Stuxnet vulnerabilities analysis of SCADA systems

6Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Stuxnet virus is a first discovered malware to damage nuclear power station in June 2010 and targets only Siemens supervisory control and data acquisition (SCADA) system via vulnerabilities. Through the static reverse and dynamic analysis of Stuxnet malware files, we researched on MS10-046 (CVE-2010-2772) shortcut vulnerability, MS10-061 (CVE-2010-2729) in print spooler service vulnerability and MS10-073 (CVE-2010-2743) keyboard layout elevation of privilege vulnerability. The paper illustrated internal details and the Stuxnet implemented methods. © Springer-Verlag Berlin Heidelberg 2012.

Author supplied keywords

Cite

CITATION STYLE

APA

Wang, Y., Gu, D., Peng, D., Chen, S., & Yang, H. (2012). Stuxnet vulnerabilities analysis of SCADA systems. In Communications in Computer and Information Science (Vol. 345, pp. 640–646). https://doi.org/10.1007/978-3-642-35211-9_81

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free