A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet

Cyber Physical Systems (CPSs) are increasingly being adopted in a wide range of industries such as smart power grids. Even though the rapid proliferation of CPSs brings huge benefits to our society, it also provides potential attackers with many new opportunities to affect the physical world such as...

Full description

Bibliographic Details
Main Authors: Nourian, Arash (Contributor), Madnick, Stuart E (Contributor)
Other Authors: Sloan School of Management (Contributor)
Format: Article
Language:English
Published: Institute of Electrical and Electronics Engineers (IEEE), 2017-06-07T19:50:15Z.
Subjects:
Online Access:Get fulltext
LEADER 01652 am a22001933u 4500
001 109718
042 |a dc 
100 1 0 |a Nourian, Arash  |e author 
100 1 0 |a Sloan School of Management  |e contributor 
100 1 0 |a Nourian, Arash  |e contributor 
100 1 0 |a Madnick, Stuart E  |e contributor 
700 1 0 |a Madnick, Stuart E  |e author 
245 0 0 |a A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet 
260 |b Institute of Electrical and Electronics Engineers (IEEE),   |c 2017-06-07T19:50:15Z. 
856 |z Get fulltext  |u http://hdl.handle.net/1721.1/109718 
520 |a Cyber Physical Systems (CPSs) are increasingly being adopted in a wide range of industries such as smart power grids. Even though the rapid proliferation of CPSs brings huge benefits to our society, it also provides potential attackers with many new opportunities to affect the physical world such as disrupting the services controlled by CPSs. Stuxnet is an example of such an attack that was designed to interrupt the Iranian nuclear program. In this paper, we show how the vulnerabilities exploited by Stuxnet could have been addressed at the design level. We utilize a system theoretic approach, based on prior research on system safety, that takes both physical and cyber components into account to analyze the threats exploited by Stuxnet. We conclude that such an approach is capable of identifying cyber threats towards CPSs at the design level and provide practical recommendations that CPS designers can utilize to design a more secure CPS. 
546 |a en_US 
655 7 |a Article 
773 |t IEEE Transactions on Dependable and Secure Computing