Bereiche | Tage | Auswahl | Suche | Aktualisierungen | Downloads | Hilfe

AGA: Arbeitsgruppe Physik und Abrüstung

AGA 8: Proliferation of Nuclear Technologies

AGA 8.2: Vortrag

Donnerstag, 7. März 2013, 18:00–18:30, HSZ-04

Cyber meets Nuclear - Stuxnet and the Cyberattacks on Iranian Centrifuges — •Matthias Englert — IANUS, TU-Darmstadt

In 2010 the computer worm Stuxnet attacked the information hardware of the Iranian uranium enrichment program. Stuxnet spread by USB flash drives and attacked SCADA software installed on Windows systems via several zero-day exploits. SCADA configures programmable logic controllers which control in the case of the Iranian centrifuge cascades frequency converter drives to choose the frequency of centrifuge motors. Thus the attackers were able to either change the rotation frequency of the rotor and thereby the separative power of the centrifuge or even destroy the fast spinning centrifuges by stopping and restarting them. The designers of Stuxnet must have had intimate knowledge of the facility design as e.g. the cascade connection scheme was programmed into Stuxnet. Based on this information some calculations of the Iranian cascade regarding the potential to produce highly enriched uranium will be presented using cascade simulation tools.

The use of such highly sophisticated computer attacks to sabotage a nuclear program shed a new light on the debate about cyber attacks and the use of information technology for kinetic attacks in general. The talk will address problems the weaponization of information technology poses for international security and will highlight some more recent developments.

100% | Bildschirmansicht | English Version | Kontakt/Impressum/Datenschutz
DPG-Physik > DPG-Verhandlungen > 2013 > Dresden