[SystemSafety] "Ripple20 vulnerabilities will haunt the IoT landscape for years to come"

Peter Bernard Ladkin ladkin at causalis.com
Fri Jun 19 07:42:41 CEST 2020



On 2020-06-19 04:20 , Les Chambers wrote:
> 
> So if you've got a safety critical system your only option is AIR GAP. And I'm sure there is someone
> out there who would give me an argument on that.

Yes. You might have heard of Stuxnet, 2010. Components of an "air-gapped" system were partially
destroyed during operation, through malware.

The "classic" read is https://www.langner.com/to-kill-a-centrifuge/ , or, in redacted version for
the journal Foreign Policy, https://foreignpolicy.com/2013/11/19/stuxnets-secret-twin/

PBL

Prof. Peter Bernard Ladkin, Bielefeld, Germany
Styelfy Bleibgsnd
Tel+msg +49 (0)521 880 7319  www.rvs-bi.de





-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.techfak.uni-bielefeld.de/pipermail/systemsafety/attachments/20200619/6ca87071/attachment.sig>


More information about the systemsafety mailing list