[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Stuxnet: Dissecting a Cyberwarfare Weapon

Published: 01 May 2011 Publication History

Abstract

Ralph Langner, an expert in industrial control system security, explores the technical side of Stuxnet, dangerous malware that attacks SCADA systems.

Cited By

View all
  • (2024)Reconfigurable and Scalable Honeynet for Cyber-physical SystemsACM SIGAda Ada Letters10.1145/3706601.370661744:1(90-94)Online publication date: 2-Dec-2024
  • (2024)REMaQE: Reverse Engineering Math Equations from ExecutablesACM Transactions on Cyber-Physical Systems10.1145/36996748:4(1-25)Online publication date: 8-Oct-2024
  • (2024)BT2X: Multi-Leveled Binary Transparency to Protect the Software Supply Chain of Operational TechnologyProceedings of the Sixth Workshop on CPS&IoT Security and Privacy10.1145/3690134.3694816(41-54)Online publication date: 19-Nov-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Security and Privacy
IEEE Security and Privacy  Volume 9, Issue 3
May 2011
83 pages

Publisher

IEEE Educational Activities Department

United States

Publication History

Published: 01 May 2011

Author Tags

  1. Ralph Langner
  2. SCADA
  3. Stuxnet
  4. cyberwarfare
  5. digital code signing

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Reconfigurable and Scalable Honeynet for Cyber-physical SystemsACM SIGAda Ada Letters10.1145/3706601.370661744:1(90-94)Online publication date: 2-Dec-2024
  • (2024)REMaQE: Reverse Engineering Math Equations from ExecutablesACM Transactions on Cyber-Physical Systems10.1145/36996748:4(1-25)Online publication date: 8-Oct-2024
  • (2024)BT2X: Multi-Leveled Binary Transparency to Protect the Software Supply Chain of Operational TechnologyProceedings of the Sixth Workshop on CPS&IoT Security and Privacy10.1145/3690134.3694816(41-54)Online publication date: 19-Nov-2024
  • (2024)Dead Man’s PLC: Towards Viable Cyber Extortion for Operational TechnologyDigital Threats: Research and Practice10.1145/36706955:3(1-24)Online publication date: 20-Jun-2024
  • (2024)CASPER: Context-Aware IoT Anomaly Detection System for Industrial Robotic ArmsACM Transactions on Internet of Things10.1145/36704145:3(1-36)Online publication date: 1-Jun-2024
  • (2024)Detecting Cyber Attacks in Industrial Control Systems Using Duration-aware Representation LearningProceedings of the 2024 10th International Conference on Computing and Artificial Intelligence10.1145/3669754.3669812(379-386)Online publication date: 26-Apr-2024
  • (2024)Release the Hounds! Automated Inference and Empirical Security Evaluation of Field-Deployed PLCs Using Active Network DataProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690195(3674-3688)Online publication date: 2-Dec-2024
  • (2024)Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic FuzzersACM Transactions on Software Engineering and Methodology10.1145/364184733:4(1-26)Online publication date: 22-Jan-2024
  • (2024)The SA4P Framework: Sensing and Actuation as a PrivilegeProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3657006(873-885)Online publication date: 1-Jul-2024
  • (2024)On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic ControllersProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3645002(947-961)Online publication date: 1-Jul-2024
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media