Publication | Closed Access
A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet
209
Citations
15
References
2015
Year
EngineeringInformation SecuritySystems Theoretic ApproachCyber Security EngineeringCyber-physical-social SystemsHardware SecurityScada SecuritySystems EngineeringSecurity ThreatsCps SecurityComputer EngineeringComputer ScienceData SecurityCryptographyCyber Physical SystemsCps DesignersControl System SecurityCybersecurity SystemSecure Cps
Cyber‑physical systems are increasingly adopted across industries, offering significant benefits but also creating new avenues for attackers to disrupt physical processes, as exemplified by the Stuxnet attack on Iran’s nuclear program. This study demonstrates how the vulnerabilities exploited by Stuxnet could have been mitigated through design‑level countermeasures. The authors employ a system‑theoretic framework grounded in system safety principles that jointly considers cyber and physical components to analyze the threats leveraged by Stuxnet. They conclude that this approach effectively identifies design‑time cyber threats to CPSs and yields actionable recommendations for designers to enhance system security.
Cyber physical systems (CPSs) are increasingly being adopted in a wide range of industries such as smart power grids. Even though the rapid proliferation of CPSs brings huge benefits to our society, it also provides potential attackers with many new opportunities to affect the physical world such as disrupting the services controlled by CPSs. Stuxnet is an example of such an attack that was designed to interrupt the Iranian nuclear program. In this paper, we show how the vulnerabilities exploited by Stuxnet could have been addressed at the design level. We utilize a system theoretic approach, based on prior research on system safety, that takes both physical and cyber components into account to analyze the threats exploited by Stuxnet. We conclude that such an approach is capable of identifying cyber threats towards CPSs at the design level and provide practical recommendations that CPS designers can utilize to design a more secure CPS.
| Year | Citations | |
|---|---|---|
Page 1
Page 1