[SystemSafety] "Ripple20 vulnerabilities will haunt the IoT landscape for years to come"
Peter Bernard Ladkin
ladkin at causalis.com
Fri Jun 19 07:42:41 CEST 2020
On 2020-06-19 04:20 , Les Chambers wrote:
>
> So if you've got a safety critical system your only option is AIR GAP. And I'm sure there is someone
> out there who would give me an argument on that.
Yes. You might have heard of Stuxnet, 2010. Components of an "air-gapped" system were partially
destroyed during operation, through malware.
The "classic" read is https://www.langner.com/to-kill-a-centrifuge/ , or, in redacted version for
the journal Foreign Policy, https://foreignpolicy.com/2013/11/19/stuxnets-secret-twin/
PBL
Prof. Peter Bernard Ladkin, Bielefeld, Germany
Styelfy Bleibgsnd
Tel+msg +49 (0)521 880 7319 www.rvs-bi.de
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.techfak.uni-bielefeld.de/pipermail/systemsafety/attachments/20200619/6ca87071/attachment.sig>
More information about the systemsafety
mailing list