Engineering at 30 Frames


Engineering at 30 Frames focuses on interesting videos and items a bit off the beaten path within the world of Control Engineering. The videos discussed may span a wide range of subjects from robotics to cloud computing, so check in often to get the pulse of what’s engaging the Control Engineering community.


Gust Gianos has served as a Content Specialist with Control Engineering since December 2010; he has worked on multiple projects including Leaders Under 40 and Engineers' Choice.


If you have any interesting suggestions, questions, or comments send them to ggianos(at)cfemedia.com.


Decoding Stuxnet

Engineering at 30 Frames: Understand the basics, future, and view a demonstration of Stuxnet

April 04, 2012


Though originally launched a few years ago, Stuxnet is still around and likely to stir up trouble in the future. A recent 60 Minutes report aired on the subject, including interviews with top security officials and information on how the virus was originally spotted. Stuxnet should be a concern not only for the government, but control engineers too.

Stuxnet is incredibly intelligent in that it works itself into a system via a seemingly safe device (most often claimed to be a flash drive) and locates a specific computer capable of reprogramming a specific PLC. The virus then allows an outside entity to reprogram the PLC in question to do whatever the “hacker” wants. This was first utilized to target a nuclear enrichment facility in Iran. The virus looked specifically for one PLC, one responsible for controlling the speed of centrifuges used to enrich uranium, and increased the speeds of the rotors in the centrifuges to the point of failure.

While this may seem easy to catch, Stuxnet disguised the change in speed to operators at the enrichment facility and made it seem as though everything was operating as normal. This allowed centrifuges to damage themselves and seem as if they were merely burning out themselves as opposed to what was really happening: sabotage by software.

Symantec Corporation has been very active in understanding and decoding Stuxnet, going so far as to prove the concept of how the virus works with an actual demonstration. In September of 2011, Symantec learned of the “next” Stuxnet, dubbed Duqu, which appears to be more of a data miner than a means to modify coding for control systems. Experts believe that Duqu is a precursor of what is to come, once intelligence is mined it can be used in conjunction with a true Stuxnet virus to do even more damage. Since it more like a data miner, it could possibly go undetected without a “physical” presence.

While some of the applications we use PLCs for will probably never come under fire, it’s important for the control engineering community to be aware of the current security risks in our field. Furthermore, the existence of viruses capable of massive cyber-attacks can and will change the way we do our jobs.

Read more from Symantec Security Response

Also see: controleng.com/channels/plant-safety-and-security


No entries

Nothing found in the guestbook.

CAPTCHA image for SPAM prevention