메뉴 건너뛰기




Volumn 22, Issue 3, 2013, Pages 365-404

Stuxnet and the Limits of Cyber Warfare

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84881657193     PISSN: 09636412     EISSN: 15561852     Source Type: Journal    
DOI: 10.1080/09636412.2013.816122     Document Type: Article
Times cited : (244)

References (167)
  • 1
    • 84930449118 scopus 로고    scopus 로고
    • The original announcement of "Rootkit. TmpHider" was posted by Sergey Ulasen of VirusBlokAda on an information security forum on 12 July 2010, http://www.anti-virus.by/en/tempo.shtml. For an accessible account of Stuxnet's discovery see Kim Zetter, "How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History, " Wired Threat Level Blog, 11 July 2011, http://www.wired.com/ threatlevel/2011/07/how-digital-detectives-deciphered-stuxnet.
    • (2010) Rootkit. TmpHider
  • 2
    • 84870717848 scopus 로고    scopus 로고
    • How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History
    • note
    • For an accessible account of Stuxnet's discovery see Kim Zetter, "How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History, " Wired Threat Level Blog, 11 July 2011, http://www.wired.com/ threatlevel/2011/07/how-digital-detectives-deciphered-stuxnet.
    • (2011) Wired Threat Level Blog
    • Zetter, K.1
  • 3
    • 79960349207 scopus 로고    scopus 로고
    • note
    • Aleksandr Matrosov, Eugene Rodionov, David Harley, and Juraj Malcho, "Stuxnet under the Microscope, " ESET, white paper, 20 January 2011. The dubious honor of "most sophisticated malware" has perhaps passed to a Stuxnet relative named Duqu or to the Flame spyware (which is twenty times the file size of Stuxnet).
    • (2011) Stuxnet under the Microscope
    • Matrosov, A.1    Rodionov, E.2    Harley, D.3    Malcho, J.4
  • 4
    • 79251638534 scopus 로고    scopus 로고
    • Stuxnet Malware Is 'Weapon' Out to Destroy. Iran's Bushehr Nuclear Plant?
    • note
    • Mark Clayton, "Stuxnet Malware Is 'Weapon' Out to Destroy. Iran's Bushehr Nuclear Plant?" Christian Science Monitor, 21 September 2010.
    • (2010) Christian Science Monitor
    • Clayton, M.1
  • 5
    • 84867315484 scopus 로고    scopus 로고
    • Obama Order Sped Up Wave of Cyberattacks Against Iran
    • note
    • David E. Sanger, "Obama Order Sped Up Wave of Cyberattacks Against Iran, " New York Times, 1 June 2012.
    • (2012) New York Times
    • Sanger, D.E.1
  • 6
    • 81055128075 scopus 로고    scopus 로고
    • Israel Tests on Worm Called Crucial in Iran Nuclear Delay
    • note
    • William J. Broad, John Markoff, and David E. Sanger, "Israel Tests on Worm Called Crucial in Iran Nuclear Delay, " New York Times, 15 January 2011.
    • (2011) New York Times
    • Broad, W.J.1    Markoff, J.2    Sanger, D.E.3
  • 7
    • 84865537867 scopus 로고    scopus 로고
    • The New Cyber Arms Race
    • note
    • Mark Clayton, "The New Cyber Arms Race, " Christian Science Monitor, 7 March 2011, ("cyber equivalent").
    • (2011) Christian Science Monitor
    • Clayton, M.1
  • 8
    • 84881644684 scopus 로고    scopus 로고
    • Russia Says Stuxnet Could Have Caused New Chernobyl
    • note
    • "Russia Says Stuxnet Could Have Caused New Chernobyl, " Reuters, 26 January 2011.
    • (2011) Reuters
  • 10
    • 84881640616 scopus 로고    scopus 로고
    • Cyberwar is the New Atomic Age
    • note
    • Arguments for the Cyber Revolution thesis by former senior US officials include Mike McConnell, "Cyberwar is the New Atomic Age, " New Perspectives Quarterly 26, no. 3 (Summer 2009): 72-77.
    • (2009) New Perspectives Quarterly , vol.26 , Issue.3 , pp. 72-77
    • McConnell, M.1
  • 13
    • 79251616434 scopus 로고    scopus 로고
    • Stuxnet and the Future of Cyber War
    • note
    • On Stuxnet as an RMA, see James P. Farwell and Rafal Rohozinski, "Stuxnet and the Future of Cyber War, " Survival 53, no. 1 (February-March 2011): 23-40
    • (2011) Survival , vol.53 , Issue.1 , pp. 23-40
    • Farwell, J.P.1    Rohozinski, R.2
  • 14
    • 84880939180 scopus 로고    scopus 로고
    • Nuclear Lessons for Cyber Security?
    • note
    • Joseph S. Nye Jr., "Nuclear Lessons for Cyber Security?" Strategic Studies Quarterly 5, no. 4 (Winter 2011)
    • (2011) Strategic Studies Quarterly , vol.5 , Issue.4
    • Nye Jr., J.S.1
  • 15
    • 84861056339 scopus 로고    scopus 로고
    • Stuxnet: Cyberwar Revolution in Military Affairs
    • note
    • Paulo Shakarian, "Stuxnet: Cyberwar Revolution in Military Affairs, " Small Wars Journal (April 2011)
    • (2011) Small Wars Journal
    • Shakarian, P.1
  • 17
    • 84881642377 scopus 로고    scopus 로고
    • note
    • Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security, US Dept. of Defense, New York City, 11 October 2012, http://www.defense.gov/transcripts/transcript.aspx? transcriptid=5136.
    • (2012)
  • 18
    • 84872351681 scopus 로고    scopus 로고
    • Taking the Cyberattack Threat Seriously
    • note
    • Barack Obama, "Taking the Cyberattack Threat Seriously, " Wall Street Journal, 19 July 2012.
    • (2012) Wall Street Journal
    • Obama, B.1
  • 20
    • 84881644905 scopus 로고    scopus 로고
    • DoD to Release Public Version of Cyber Strategy
    • note
    • Adm. Mike Mullen, quoted in Marcus Weisgerber, "DoD to Release Public Version of Cyber Strategy, " Defense News, 8 July 2011. This is an astonishing claim coming from a man well familiar with the world's nuclear arsenals.
    • (2011) Defense News
    • Mullen, M.1    Weisgerber, M.2
  • 27
    • 84863600432 scopus 로고    scopus 로고
    • Cyberwar: A New 'Absolute Weapon'? The Proliferation of Cyberwarfare Capabilities and Interstate War
    • Adam P. Liff, "Cyberwar: A New 'Absolute Weapon'? The Proliferation of Cyberwarfare Capabilities and Interstate War, " Journal of Strategic Studies 35, no. 3 (June 2012).
    • (2012) Journal of Strategic Studies , vol.35 , Issue.3
    • Liff, A.P.1
  • 28
    • 78650062267 scopus 로고    scopus 로고
    • note
    • On the direct technical effects of Stuxnet on Iranian computer systems, I draw on forensic investigation by computer security firms Symantec, ESET, and Langner Communications; Nicolas Falliere, Liam O Murchu, and Eric Chien, "W32. Stuxnet Dossier, version 1.4, " Symantec, 4 February 2011, http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_ stuxnet_dossier.pdf.
    • (2011) W32. Stuxnet Dossier, version 1.4
    • Falliere, N.1    Murchu, L.O.2    Chien, E.3
  • 30
    • 84929288908 scopus 로고    scopus 로고
    • For a detailed history of computerization in the American private and public sector, see James W. Cortada, The Digital Hand, 3 vols. (New York: Oxford University Press, 2004-2008).
    • (2004) The Digital Hand , vol.3
    • Cortada, J.W.1
  • 37
    • 84872945708 scopus 로고    scopus 로고
    • Estonia after the 2007 Cyber Attacks: Legal, Strategic and Organisational Changes in Cyber Security
    • Christian Czosseck, Rain Ottis, and Anna-Maria Talihärm, "Estonia after the 2007 Cyber Attacks: Legal, Strategic and Organisational Changes in Cyber Security, " Journal of Cyber Warfare and Terrorism 1, no. 1 (2011).
    • (2011) Journal of Cyber Warfare and Terrorism , vol.1 , Issue.1
    • Czosseck, C.1    Ottis, R.2    Talihärm, A.-M.3
  • 38
    • 79959330092 scopus 로고    scopus 로고
    • Overview By the US-CCU of the Cyber Campaign Against Georgia in August of 2008
    • note
    • John Bumgarner and Scott Borg, "Overview By the US-CCU of the Cyber Campaign Against Georgia in August of 2008, " US Cyber Consequences Unit Report, August 2009
    • (2009) US Cyber Consequences Unit Report
    • Bumgarner, J.1    Borg, S.2
  • 40
    • 84881645176 scopus 로고    scopus 로고
    • note
    • Military doctrine has not stabilized for cyber concepts yet, and debate continues on the distinctions between cyber warfare, computer network operations, information operations, electronic warfare, etc. In this paper I focus on the use of computer hacking to cause mechanical damage in the service of strategic objectives. Cyber warfare clearly encompasses the tactical modalities of cyber attack (degredation of normal hardware or software functionality), exploitation (covert theft or use of data or computational resources), and defense (efforts to prevent adversarial attack or exploitation); my emphasis in this paper is on the primary aggressive move of attack.
  • 41
    • 84881646573 scopus 로고    scopus 로고
    • Why Syria's Air Defenses Failed to Detect Israelis
    • note
    • David A. Fulghum, "Why Syria's Air Defenses Failed to Detect Israelis, " Aviation Week, Ares Blog, 3 October 2007.
    • (2007) Aviation Week
    • Fulghum, D.A.1
  • 42
    • 84881621160 scopus 로고    scopus 로고
    • U.S. Accelerating Cyberweapon Research
    • note
    • Ellen Nakashima, "U.S. Accelerating Cyberweapon Research, " Washington Post, 18 March 2012.
    • (2012) Washington Post
    • Nakashima, E.1
  • 43
    • 84881638326 scopus 로고    scopus 로고
    • US General: We Hacked the Enemy in Afghanistan
    • note
    • Raphael Satter, "US General: We Hacked the Enemy in Afghanistan, " Associated Press, 24 August 2012.
    • (2012) Associated Press
    • Satter, R.1
  • 44
    • 78649876633 scopus 로고    scopus 로고
    • Martin Libicki, Cyberdeterrence and Cyberwar (Santa Monica, CA: RAND, 2009) distinguishes "operational cyberwar-cyberattacks to support warfighting" from "strategic cyberwar, cyberattacks to affect state policy".
    • (2009) Cyberdeterrence and Cyberwar
    • Libicki, M.1
  • 46
    • 84864105157 scopus 로고    scopus 로고
    • CIA Chief Leon Panetta: The Next Pearl Harbor Could Be a Cyberattack
    • Anna Mulrine, "CIA Chief Leon Panetta: The Next Pearl Harbor Could Be a Cyberattack, " Christian Science Monitor, 9 June 2011.
    • (2011) Christian Science Monitor
    • Mulrine, A.1
  • 49
    • 15944393623 scopus 로고    scopus 로고
    • Widely cited as an example of supply-chain sabotage is an elaborate 1982 counterintelligence operation in which the CIA allegedly tampered with Canadian software that the Soviets planned to steal. Once the Soviets installed it in controllers on the Trans-Siberian oil pipeline, this Trojan horse caused "the most monumental non-nuclear explosion and fire ever seen from space" and "significant damage to the Soviet economy, " according to Thomas C. Reed, At the Abyss: An Insider's History of the Cold War (New York: Random House, 2004), 268-69.
    • (2004) At the Abyss: An Insider's History of the Cold War , pp. 268-269
    • Reed, T.C.1
  • 50
    • 84881638178 scopus 로고    scopus 로고
    • Brazilian Blackout Traced to Sooty Insulators, Not Hackers
    • note
    • Marcelo Soares, "Brazilian Blackout Traced to Sooty Insulators, Not Hackers, " Wired Threat Level Blog, 9 November 2009, http://www.wired. com/threatlevel/2009/11/brazil_blackout
    • (2009) Wired Threat Level Blog
    • Soares, M.1
  • 52
    • 84874543195 scopus 로고    scopus 로고
    • Beyond Cyber-Doom: Assessing the Limits of Hypothetical Scenarios in the Framing of Cyber-Threats
    • note
    • On the historical absence of cyberwar, see Sean Lawson, "Beyond Cyber-Doom: Assessing the Limits of Hypothetical Scenarios in the Framing of Cyber-Threats, " Journal of Information Technology & Politics 10, no. 1 (December 2012): 86-103
    • (2012) Journal of Information Technology & Politics , vol.10 , Issue.1 , pp. 86-103
    • Lawson, S.1
  • 53
    • 34247095107 scopus 로고    scopus 로고
    • Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games?
    • note
    • Michael Stohl, "Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games?" Crime, Law and Social Change 46, nos. 4-5 (December 2006): 223-38.
    • (2006) Crime, Law and Social Change , vol.46 , Issue.4-5 , pp. 223-238
    • Stohl, M.1
  • 54
    • 84881618430 scopus 로고    scopus 로고
    • Computer-Based Attacks Emerge As Threat of Future, General Says
    • note
    • Bill Gertz, "Computer-Based Attacks Emerge As Threat of Future, General Says, " Washington Times, 13 September 2011. Alexander also cited "the August 2003 electrical power outage in the Northeast U.S. that was caused by a tree damaging two high-voltage power lines. Electrical power-grid software that controlled the distribution of electricity to millions of people improperly entered 'pause' mode and shut down all power through several states. "
    • (2011) Washington Times
    • Gertz, B.1
  • 55
    • 77958600609 scopus 로고    scopus 로고
    • Defending a New Domain: The Pentagon's Cyberstrategy
    • note
    • William J. Lynn III, "Defending a New Domain: The Pentagon's Cyberstrategy, " Foreign Affairs 89, no. 5 (September-October 2010): 97-108, quote at 98-99.
    • (2010) Foreign Affairs , vol.89 , Issue.5 , pp. 97-108
    • Lynn III, W.J.1
  • 57
    • 33645149750 scopus 로고    scopus 로고
    • Cyber-Warfare Threatens Corporations: Expansion Into Commercial Environments
    • note
    • These and other trends lowering barriers to entry for cyber attack are described in Kenneth J. Knapp and William R. Boulton, "Cyber-Warfare Threatens Corporations: Expansion Into Commercial Environments, " Information Systems Management (Spring 2006).
    • (2006) Information Systems Management
    • Knapp, K.J.1    Boulton, W.R.2
  • 59
    • 30344477251 scopus 로고    scopus 로고
    • Economically Complex Cyberattacks
    • note
    • Scott Borg, "Economically Complex Cyberattacks, " IEEE Security and Privacy 3, no. 6 (December 2005): 64-67.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.6 , pp. 64-67
    • Borg, S.1
  • 60
    • 84881644173 scopus 로고    scopus 로고
    • note
    • A classic example of malformed input is a buffer overflow attack in which the attacker provides an input parameter larger than the space allocated for it by the programmer, who has failed to check the length of the input; the input string thus overwrites memory for the function's internal control variables, which were supposed to be inaccessible but can now be changed arbitrarily. Note that some types of attacks exploit physical connections rather than logical inputs. Although most malware goes through the front door to exploit programming flaws, side channel attacks can exploit information from the physical implementation of a system, such as excess heat generated by correct passwords. Furthermore, even the best-designed systems can and often do fail through social engineering techniques, such as phishing scams that exploit human gullibility.
  • 61
    • 84870641439 scopus 로고    scopus 로고
    • Shopping for Zero-Days: A Price List for Hackers' Secret Software Exploits
    • note
    • Andy Greenberg, "Shopping for Zero-Days: A Price List for Hackers' Secret Software Exploits, " Forbes, 23 March 2012, http://www.forbes.com/sites/andygreenberg/2012/03/23/shopping-forzero-days-an-price-list-for-hackers-secret-software-exploits/.
    • (2012) Forbes
    • Greenberg, A.1
  • 64
    • 33750440197 scopus 로고    scopus 로고
    • The Economics of Information Security
    • note
    • Ross Anderson and Tyler Moore, "The Economics of Information Security, " Science 27, no. 5799 (October 2006): 610-13.
    • (2006) Science , vol.27 , Issue.5799 , pp. 610-613
    • Anderson, R.1    Moore, T.2
  • 65
    • 33750703619 scopus 로고    scopus 로고
    • Network Software Security and User Incentives
    • note
    • Terrence August and Tunay I. Tunca, "Network Software Security and User Incentives, " Management Science 52, no. 11 (November 2006): 1703-720
    • (2006) Management Science , vol.52 , Issue.11 , pp. 1703-1720
    • August, T.1    Tunca, T.I.2
  • 66
    • 70350780079 scopus 로고    scopus 로고
    • Cybersecurity: Stakeholder Incentives, Externalities, and Policy Options
    • Johannes M. Bauer and Michel J. G. Van Eeten, "Cybersecurity: Stakeholder Incentives, Externalities, and Policy Options, " Telecommunications Policy 33, no. 10 (2009): 706-19
    • (2009) Telecommunications Policy , vol.33 , Issue.10 , pp. 706-719
    • Bauer, J.M.1    van Eeten, M.J.G.2
  • 67
    • 78650891506 scopus 로고    scopus 로고
    • Cybersecurity Myths on Power Control Systems: 21 Misconceptions and False Beliefs
    • note
    • Ludovic Piètre-Cambacédès, Marc Tritschler, and Göran N. Ericsson, "Cybersecurity Myths on Power Control Systems: 21 Misconceptions and False Beliefs, " IEEE Transactions on Power Delivery 26, no. 1 (Fall 2011): 161-72.
    • (2011) IEEE Transactions on Power Delivery , vol.26 , Issue.1 , pp. 161-172
    • Piètre-Cambacédès, L.1    Tritschler, M.2    Ericsson, G.N.3
  • 69
    • 84881641673 scopus 로고    scopus 로고
    • note
    • For richer discussion of the challenges of cyber deterrence-which might mean deterring cyber attacks or using the threat of cyber attack to deter other activity. See National Research Council, Proceedings of a Workshop.
    • Proceedings of a Workshop
  • 70
    • 84881635477 scopus 로고    scopus 로고
    • note
    • General Martin Dempsey, speech at the Commonwealth Club of California, 27 July 2012, http:// www.commonwealthclub.org/events/archive/podcast/general-martin-dempsey-chairman-joint-chiefs-st aff-72712.
    • (2012)
  • 71
    • 84881641307 scopus 로고    scopus 로고
    • The Myth of Cyber War: Bringing War on the Internet Back Down to Earth
    • note
    • I am grateful to Erik Gartzke for framing the gap between the "logic of possibility" and the "logic of consequence" in cyber warfare discourse; see Gartzke, "The Myth of Cyber War: Bringing War on the Internet Back Down to Earth" (paper presented at the International Studies Association Annual Convention, San Diego, April 2012).
    • (2012) International Studies Association Annual Convention
    • Gartzke, E.1
  • 73
    • 34248396411 scopus 로고    scopus 로고
    • Osirak Redux? Assessing Israeli Capabilities to Destroy Iranian Nuclear Facilities
    • Whitney Raas and Austin Long, "Osirak Redux? Assessing Israeli Capabilities to Destroy Iranian Nuclear Facilities, " International Security 31, no. 4 (Spring 2007): 7-33.
    • (2007) International Security , vol.31 , Issue.4 , pp. 7-33
    • Raas, W.1    Long, A.2
  • 74
    • 84862882155 scopus 로고    scopus 로고
    • note
    • The precise configuration of Natanz' networks has not been revealed to IAEA inspectors, but we can gain some insight into the defensive challenge from Siemens-recommended best practices for ICS security and through analysis of the pattern of exploits employed by Stuxnet, as discussed in Eric Byres, Andrew Ginter and Joel Langill, "How Stuxnet Spreads: A Study of Infection Paths in Best Practice Systems, " Tofino Security white paper, 22 February 2011. The Iranians probably diverged significantly from best practices, but the operational implications of this are ambiguous, as discussed below: it may either have provided more vulnerabilities to exploit, or it may have invalidated target intelligence. According to Byres et al., the outer level of the FEP would have been the enterprise network, which hosted most of the everyday business and administrative computers. Within that was the perimeter network-sometimes called "the demilitarized zone" among ICS administrators-where servers managed the computer equipment in the control systems and provided data to end users in the enterprise network. Firewall servers on the perimeter network gateways would have been set to "deny by default" so that they only allowed incoming connections from authorized users with legitimate credentials and outgoing connections only to specifically approved servers for maintenance. This network may indeed have had physical connections from the FEP's exterior networks to sensitive ICS to facilitate remote management and troubleshooting-there might not have been an "air gap"-but there would have been, nonetheless, multiple logical layers of defenses to penetrate. The perimeter network protected SIMATIC systems, and there may have been different system partitions for each of the different cascade modules in the FEP's two production halls. Each of these included the process control network that hosted human interface servers for the SIMATIC operator and engineering systems as well as the control system network that hosted the automation system running the controllers and peripherals driving industrial processes.
    • (2011) How Stuxnet Spreads: A Study of Infection Paths in Best Practice Systems
    • Byres, E.1    Ginter, A.2    Langill, J.3
  • 75
    • 79960038785 scopus 로고    scopus 로고
    • note
    • David Albright, Paul Brannan, and Christina Walrond, "Stuxnet Malware and Natanz: Update of ISIS December 22, 2010 Report, " Institute for Science and International Security, 15 February 2011, 2. Symantec has not publicly released the names of these companies. Epidemiological data came from Stuxnet itself: as it copies itself from computer to computer, each instance keeps a log of all the machines infected by the lineage (evidence of developers interested in debugging or accountability). From samples of the worm collected in the wild, Falliere et al. traced a total twelve thousand infections to five internet domain names, the names of which have not been publicly disclosed. One of these domains was infected on three separate occasions, one was infected twice, two were infected only once, and one had three different computers infected at once (as if an infected thumb drive was repeatedly connected), for a total of ten known initial infections. There are three known versions of Stuxnet, but based on IAEA inspection data only the first version appears to have done any damage at Natanz. The three different compilations of Stuxnet attacked multiple sites in three waves: June and July 2009, March 2010, and April and May 2010. The IAEA observed that about one thousand centrifuges were disconnected in January 2010, as covered later, but in subsequent inspections, the Iranians were already bringing them back under vacuum when the second and third waves hit. These second and third versions thus appear to have had no dramatic effect as the total number of enriching cascades began to increase after August 2010. Considering only insertions of the first version, Stuxnet's damage thus resulted from four initial infections, each in a different domain in Iran. The delay between compilation and infection could have been due to the logistic challenges of testing and getting the worm to the human agents who would launch the attack, or to internal bureaucratic processes within the attacking organization such as legal review. I assume that compilation, the process that packages human-readable programs into the executable binary file, occurred on computers at the attack's home facility, although remote compilation is technically possible. The attack waves, defined as the infections associated with a single compilation, are distributed across the ten initial infections: four, one, and five. The minimum time between compile and infect time was twelve hours, the next shortest was over six days, and the maximum was twenty eight days.
    • Stuxnet Malware and Natanz: Update of ISIS December 22, 2010 Report
    • Albright, D.1    Brannan, P.2    Walrond, C.3
  • 76
    • 84881651063 scopus 로고    scopus 로고
    • note
    • Contractors might have been especially attractive as mules, as they could have unwittingly received the malware at tradeshows. Employees or contractors might also carry infected SIMATIC files directly to computers in the interior control system while performing maintenance, thus bypassing safeguards in the perimeter network altogether and vastly simplifying Stuxnet's infiltration. Alternatively, attackers could have sent phishing emails to employees with infected attachments that would open and drop the worm. See Byres et al., "How Stuxnet Spreads, " 13. A lot of attention has been paid to a zero-day vulnerability in Windows shortcut (. lnk) files that enable a hacked shortcut to surreptitiously load malware binaries as soon as the icon is simply viewed onscreen (MS10-046). This vulnerability appeared for the first time in the second version of Stuxnet, compiled on 1 March 2010. As I argue elsewhere, most of the centrifuge damage attributed to Stuxnet occurred prior to March 2010; thus it might not have been the celebrated. lnk vulnerability that delivered the payload that actually did the work at Natanz. The first version of Stuxnet used a less sophisticated autorun. inf vulnerability to propagate via removable media; Falliere, "W32. Stuxnet Dossier, " 31-32.
  • 78
    • 79251629967 scopus 로고    scopus 로고
    • Iran Says It Arrested Computer Worm Suspects
    • note
    • William Yong, "Iran Says It Arrested Computer Worm Suspects, " New York Times, 10 October
    • New York Times
    • Yong, W.1
  • 79
    • 84881654853 scopus 로고    scopus 로고
    • note
    • Of course, Iran was likely to arrest anyone as a scapegoat after the fact, so we cannot put too much weight on this report.
  • 80
    • 84881635451 scopus 로고    scopus 로고
    • note
    • A binary file of executable machine instructions is more or less just like any other data file until an operating system loads it up and treats it as a program. Thus attackers need first to find a way to get their binary into the proper runtime context on target computers. All of Stuxnet's functionality is packaged as a single 1.18 Mb library file (. dll). This file can export thirty-two different functions, each of which has a different purpose in controlling the worm for infiltration, communication, and sabotage, as well as other resource files these functions use.
  • 81
    • 84881640265 scopus 로고    scopus 로고
    • note
    • Upon being run on a host for the first time, the worm checks which type of antivirus program is protecting it-Symantec, ESET, McAfee, Kapersky, etc.-and then loads itself into a section of memory where that antivirus product would not look; if Stuxnet assesses that security cannot be bypassed, then that instance of the worm terminates.
  • 82
    • 84869403808 scopus 로고    scopus 로고
    • Before We Knew It: An Empirical Study of Zero-Day Attacks in the Real World
    • note
    • One of these zero-days turned out to have been employed previously by another criminal malware. It is not uncommon for zero-days to be used successfully in the field long before their discovery by defenders. Leyla Bilge and Tudor Dumitras, "Before We Knew It: An Empirical Study of Zero-Day Attacks in the Real World, " Proceedings of the19th ACM Conference on Computer and Communications Security, 16-18 October 2012.
    • (2012) Proceedings of the19th ACM Conference on Computer and Communications Security
    • Bilge, L.1    Dumitras, T.2
  • 86
    • 84881651594 scopus 로고    scopus 로고
    • note
    • Conficker exploited a vulnerability (catalogued by Microsoft as MS08-067) as well as some generic malware techniques that were also used by Stuxnet.
  • 87
    • 84963995638 scopus 로고    scopus 로고
    • note
    • Early reporting in Fall 2010, prior to discovery of the Natanz attack sequence by forensic investigators, suspected that the Bushehr reactor was the target; Clayton, "Stuxnet Malware. "
    • Stuxnet Malware
    • Clayton1
  • 91
    • 84881647161 scopus 로고    scopus 로고
    • note
    • Stuxnet's timing works not by interrogating the system clock but by counting reporting events generated by the PLC as it controls spinning motors, which is further evidence that Stuxnet developers knew and mastered FEP technical details.
  • 92
    • 55549112591 scopus 로고    scopus 로고
    • Characteristics of the Gas Centrifuge for Uranium Enrichment and Their Relevance for Nuclear Weapon Proliferation (Corrected)
    • note
    • Alexander Glaser, "Characteristics of the Gas Centrifuge for Uranium Enrichment and Their Relevance for Nuclear Weapon Proliferation (Corrected), " Science and Global Security vol. 16 (June 2008): 1-25, describes that the Iranian cascade of 164 centrifuges "is characterized by a total 15 stages; the feed is introduced in stage 5, which consists of 24 machines, " and "the product stream feeds into the next stage and the tails stream into the previous stage" in a symmetric arrangement of decreasing numbers of machines in each stage. This configuration can be verified in a publicity photo of President Mahmoud Ahmedinejad visiting the Natanz SCADA control room where, on one of the monitor screens, there is an image of an array of 164 items grouped into a symmetric arrangement of 15 clusters, http://www.president.ir/en/9172, accessed 18 April 2012. The parameters of the array pictured on the screen exactly match those in Stuxnet's code. Furthermore, there are six such arrays described in the code. Three Siemens S7-317 PLCs could control six cascades each, and this would amount to a total of eighteen cascades, which is the number known through IAEA inspections to be contained in each of the eight planned enrichment modules in one of Natanz's production halls.
    • (2008) Science and Global Security , vol.16 , pp. 1-25
    • Glaser, A.1
  • 94
    • 84881649043 scopus 로고    scopus 로고
    • Sanger, "Obama Order"; David E. Sanger, Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power (New York: Crown, 2012): 188-225.
    • Obama Order
    • Sanger1
  • 97
    • 84866623447 scopus 로고    scopus 로고
    • Stuxnet and Strategy: A Space Operation in Cyberspace
    • note
    • This attack resembles a commando raid deep into enemy territory against superior forces, as contrasted with the strategic bombing imagery of widespread devastation to economic infrastructure that is often used to describe cyber warfare. See Lukas Milevski, "Stuxnet and Strategy: A Space Operation in Cyberspace, " Joint Forces Quarterly 63, no. 4 (4th Qtr. 2011): 64-69.
    • (2011) Joint Forces Quarterly , vol.63 , Issue.4 , pp. 64-69
    • Milevski, L.1
  • 98
    • 84881658630 scopus 로고    scopus 로고
    • U.S. Intelligence Gains in Iran Seen as Boost to Confidence
    • note
    • Joby Warrick and Greg Miller, "U.S. Intelligence Gains in Iran Seen as Boost to Confidence, " Washington Post, 7 April 2012.
    • (2012) Washington Post
    • Warrick, J.1    Miller, G.2
  • 99
    • 84881640033 scopus 로고    scopus 로고
    • In Nuclear Net's Undoing, a Web of Shadowy Deals
    • note
    • William J. Broad and David E. Sanger, "In Nuclear Net's Undoing, a Web of Shadowy Deals, " New York Times, 25 August 2008.
    • (2008) New York Times
    • Broad, W.J.1    Sanger, D.E.2
  • 100
    • 84875929384 scopus 로고    scopus 로고
    • The Farewell Dossier: Duping the Soviets
    • Gus W. Weiss, "The Farewell Dossier: Duping the Soviets, " Studies in Intelligence 39, no. 5 (1996).
    • (1996) Studies in Intelligence , vol.39 , Issue.5
    • Weiss, G.W.1
  • 101
    • 84881649043 scopus 로고    scopus 로고
    • note
    • Sanger, "Obama Order, " describes "a beacon that could be inserted into the computers. " This may have been the Flame spyware that was publically discovered after Stuxnet but which had been active before it, and almost certainly a product of the same U.S.-Israeli collaboration.
    • Obama Order
    • Sanger1
  • 102
    • 84893477953 scopus 로고    scopus 로고
    • U.S., Israel Developed Flame Computer Virus to Slow Iranian Nuclear Efforts, Officials Say
    • note
    • Ellen Nakashima, Greg Miller and Julie Tate, "U.S., Israel Developed Flame Computer Virus to Slow Iranian Nuclear Efforts, Officials Say, " Washington Post, 19 June 2012. An anonymous reviewer of this paper suggests that the intelligence used in the 2007 National Intelligence Estimate on Iranian nuclearization was consistent with the sort of intelligence collected by Flame.
    • (2012) Washington Post
    • Nakashima, E.1    Miller, G.2    Tate, J.3
  • 104
    • 84881635060 scopus 로고    scopus 로고
    • Stuxnet Loaded By Iran Double Agents
    • note
    • Richard Sale, "Stuxnet Loaded By Iran Double Agents, " Industrial Safety and Security Source Blog, 11 April 2012, http://www.isssource.com/stuxnet-loaded-by-iran-double-agents/.
    • (2012) Industrial Safety and Security Source Blog
    • Sale, R.1
  • 105
    • 84869472047 scopus 로고    scopus 로고
    • note
    • Once zero-days are discovered, software vendors work on patches and antivirus firms work on detection. Thus zero-days are extremely valuable prior to use (vendors interested in defense and criminals interested in offense are both willing to pay), but their value rapidly drops off after they are revealed. Holding onto a valuable zero-day for too long is risky, since if someone else discovers and publicizes it first, then the value is lost. These properties make markets for zero-days highly imperfect because it is difficult to credibly signal quality without giving away the goods. See Charlie Miller, "The Legitimate Vulnerability Market: Inside the Secretive World of 0-Day Exploit Sales, " workshop on the Economics of Information Security, 7-8 June 2007. Attackers with the research and development resources to find and secretly stockpile zero-days in-house can insulate themselves from this market somewhat.
    • (2007) The Legitimate Vulnerability Market: Inside the Secretive World of 0-Day Exploit Sales
    • Miller, C.1
  • 107
    • 84922252846 scopus 로고    scopus 로고
    • Richard Clarke on Who Was Behind the Stuxnet Attack
    • note
    • Ron Rosenbaum, "Richard Clarke on Who Was Behind the Stuxnet Attack, " Smithsonian, April
    • Smithsonian
    • Rosenbaum, R.1
  • 108
    • 79958742157 scopus 로고    scopus 로고
    • A Declaration of Cyber-War
    • note
    • On installation the worm checks the current date and halts if it is later than 24 June 2012, which suggests that its designers expected the attack to be complete by then (this might also suggest a legal requirement to limit the lifetime of a covert operation). The first version of Stuxnet limited each instance to three infections, and each instance only had a twenty-one day window to infect others. If Stuxnet did not find SIMATIC files with the right configuration, it did not affect the functionality of the host and might even delete itself. Michael Joseph Gross, "A Declaration of Cyber-War, " Vanity Fair, April 2011, quotes Richard Clarke: "If a government were going to do something like this, a responsible government, then it would have to go through a bureaucracy, a clearance process. Somewhere along the line, lawyers would say, 'We have to prevent collateral damage,' and the programmers would go back and add features that normally you don't see in the hacks. And there are several of them in Stuxnet. It just says lawyers all over it. "
    • (2011) Vanity Fair
    • Gross, M.J.1
  • 109
    • 84874564710 scopus 로고    scopus 로고
    • note
    • Recent forensics on the Duqu worm, which was discovered after Stuxnet, and appears to target Siemens SCADA for intelligence exploitation rather than sabotage attack, reveals that both malwares share provenance in a driver compiled in January 2008. See Alexander Gostev and Igor Soumenkov, "Stuxnet/Duqu: The Evolution of Drivers, " Kaspersky Lab Securelist Blog, 28 December 2011, http: //www.securelist.com/en/analysis/204792208/Stuxnet_Duqu_The_Evolution_of_Drivers.
    • (2011) Stuxnet/Duqu: The Evolution of Drivers
    • Gostev, A.1    Soumenkov, I.2
  • 110
    • 84876158854 scopus 로고    scopus 로고
    • Stuxnet Cyberworm Heads Off US Strike on Iran
    • note
    • Ewen MacAskill, "Stuxnet Cyberworm Heads Off US Strike on Iran, " The Guardian, 16 January 2011.
    • (2011) The Guardian
    • McAskill, E.1
  • 111
    • 84881625206 scopus 로고    scopus 로고
    • Security Expert: U.S. 'Leading Force' Behind Stuxnet
    • note
    • Ralph Langner, the investigator who deciphered Stuxnet's payload, often makes this argument, e.g., Tom Gjelten, "Security Expert: U.S. 'Leading Force' Behind Stuxnet, " NPR Morning Edition, 26 September 2011.
    • (2011) NPR Morning Edition
    • Gjelten, T.1
  • 112
    • 84881636199 scopus 로고    scopus 로고
    • note
    • It is always possible to think up scenarios whereby organized criminals in the hinterlands of Siberia might have assembled a mock-up of Natanz to test their weapon, but this strains credibility.
  • 114
    • 84881659723 scopus 로고    scopus 로고
    • What's the Best Defense against Stuxnet? A Comparison of Which Tools are the Best for Finding Stuxnet in a System
    • note
    • Morteza Rezaei, "What's the Best Defense against Stuxnet? A Comparison of Which Tools are the Best for Finding Stuxnet in a System, " Control Magazine Web Exclusive, 28 May 2012, http://www.controlglobal.com/articles/2012/stuxnet-iranian-view.html, (quotation).
    • (2012) Control Magazine Web Exclusive
    • Rezaei, M.1
  • 116
    • 84881628548 scopus 로고    scopus 로고
    • note
    • The first known Stuxnet infections date to June and July 2009. Stuxnet was discovered in June 2010 and patched by August 2010 thanks to an international effort by the global commercial information security community that benefited Iran as well. Thus the Stuxnet attack lasted at most from mid-2009 to mid-2010. From May 2009 to August 2010 there were six IAEA inspections; http://www.iaea.org/newscenter/focus/ iaeairan/iaea_reports.shtml, accessed 20 April 2012.
  • 117
    • 84881626963 scopus 로고    scopus 로고
    • note
    • At Natanz in 2009-10, a single separation cascade had 164 centrifuges, and eighteen cascades were grouped into operating modules. Iran had reported plans to install a total of eight modules in the main production hall at Natanz, but by late 2009 only three were installed to some degree. IAEA inspectors were able to record, for each module, how many were filled with UF6 and thus enriching, how many were not enriching but under vacuum and ready, how many were installed but not under vacuum, and how many were disconnected altogether. Module A24 had been enriching with all eighteen cascades since 2008, while only had a fraction of the cascades of module A26 were enriching and no cascades of module A28 were performing any enrichment. Of these three modules, IAEA inspections only record damage to A26 during the Stuxnet attack window, and this damage was largely confined to centrifuges which were not yet filled with UF6. A26 appears to have suffered serious problems in the latter half of 2009. In June, twelve cascades were enriching, but in August there were only ten, and by November only six; this implies some chronic problem with enrichment. These non-enriching cascades in A26 all remained under vacuum during this time; then suddenly in January 2010, the IAEA found eleven cascades of A26 completely disconnected. Six of these were brought back under vacuum by May 2010, and after August the numbers of cascades actually enriching began to increase again. As a result, the most productive module online (A24) continued to enrich with all eighteen cascades. The newest module (A28) had sixteen cascades under installation and two being removed in January 2010, but Stuxnet is probably not to blame for those two since they were not even spinning yet.
  • 120
    • 84881620924 scopus 로고    scopus 로고
    • note
    • Might overall enrichment efficiency at Natanz have been even more degraded had Stuxnet never attacked at all? The cumulative ratio (total product and feed over time) of kg LEU to kg UF6 from 5 percent improves from early 2008 to a peak of 9 percent at the end of 2009, and then, right after the height of Stuxnet activity, gradually diminishes. At first blush this appears to be evidence for Stuxnet effectiveness. However, a more disaggregated (noncumulative) measurement of the monthly ratio tells a quite different story. From nearly 10 percent (kg/month LEU per kg/month UF6) in early 2008, efficiency declines gradually to under 8 percent in August 2009; but it then jumps suddenly to over 10 percent in November 2009, only to decline gradually again to 8 percent by September 2011. A similar story can be told with a different efficiency measure, that of average separative work per year per centrifuge. Efficiency declines from the beginning of plant operations until the beginning of Stuxnet attacks, then increases into early 2010, only to decline again after August 2010. Stuxnet in effect provided a reset to the inefficient drift of the noncumulative ratio and the average separative work; alternatively (as an anonymous reviewer has pointed out), Stuxnet acted as a quality control measure for Iran by removing inefficient centrifuges. Either way, in the absence of this bump in efficiency, the ultimate performance could have been even worse. Technical details are drawn from David Albright and Christina Walrond, "Performance of the IR-1 Centrifuge At Natanz, " Institute for Science and International Security, 18 October 2011.
    • (2011) Performance of the IR-1 Centrifuge At Natanz
    • Albright, D.1    Walrond, C.2
  • 124
    • 0033236359 scopus 로고    scopus 로고
    • The Ethnography of Infrastructure
    • note
    • Susan Leigh Star, "The Ethnography of Infrastructure, " American Behavioral Scientist 43, no. 3 (November 1999): 377-91.
    • (1999) American Behavioral Scientist , vol.43 , Issue.3 , pp. 377-391
    • Star, S.L.1
  • 131
    • 84881649040 scopus 로고    scopus 로고
    • note
    • One might argue that friction is even more problematic for cyber warfare than other operations. Unlike a human commando team that can rely upon their intuition and ingenuity to recognize and adapt to unforeseen problems, malware has only explicit rules and coded assumptions to guide it. Malware that communicates through command and control servers does not solve this problem because the remote operator remains deeply unaware of actual machine states, details of real time network configuration, and the activities of local users in situ. Even if the payload manages to reach its target, there is no guarantee that the target equipment and organization will react as attack planners expect, or on the anticipated timelines.
  • 132
    • 85047875702 scopus 로고
    • Collective Mind in Organizations: Heedful Interrelating on Flight Decks
    • Karl E. Weick and Karlene H. Roberts, "Collective Mind in Organizations: Heedful Interrelating on Flight Decks, " Administrative Science Quarterly 38, no. 3 (1993): 357-81.
    • (1993) Administrative Science Quarterly , vol.38 , Issue.3 , pp. 357-381
    • Weick, K.E.1    Roberts, K.H.2
  • 133
    • 84968080940 scopus 로고
    • Organizational Culture as a Source of High Reliability
    • note
    • Karl E. Weick, "Organizational Culture as a Source of High Reliability, " California Management Review 29, no. 2 (Winter 1987): 112-27.
    • (1987) California Management Review , vol.29 , Issue.2 , pp. 112-127
    • Weick, K.E.1
  • 134
    • 84881633264 scopus 로고    scopus 로고
    • note
    • Lawson, "Beyond Cyber-Doom, " reviews studies of societies that experience natural and military disasters; scholars find that such societies, especially if they have high social capital, are likely to display altruistic tendencies and to organize themselves to restore services. Ironically, given the cyber war emphasis on the vulnerability of advanced industrial states, such societies are more likely to have the social resources to compensate for disaster.
    • Beyond Cyber-Doom
    • Lawson1
  • 135
    • 77952361183 scopus 로고    scopus 로고
    • note
    • Computer security engineers usually deride "security through obscurity" in the belief that a determined hacker always finds a way through, or that lazy users who ignore security can easily be exploited. Although by way of comparison, see Andrew Odlyzko, "Providing Security with Insecure Systems, " ACM Conference on Wireless Network Security, March 2010. The argument here is that obscurity in embedded practice of the larger socio-technical system, not just the narrow computer system, can enhance security.
  • 138
    • 78650062267 scopus 로고    scopus 로고
    • note
    • Falliere, "W32. Stuxnet Dossier, " 5-7; Symantec monitored two of Stuxnet's command and control servers they had discovered and found that they were in communication with one hundred thousand infected hosts in over thirty thousand organizations by the end of September 2010. One third of these infections were outside of Iran. Indonesia and India were a distant second and third in Stuxnet infections. Despite some panic over Stuxnet that it might have harmed an Indian satellite and a British reactor, the remaining global third of infections seems not to have caused any damage beyond the costs of investigation and cleanup. Stuxnet was looking for a SIMATIC configuration peculiar to Natanz, so it remained relatively inert as it spread elsewhere. Of course, the fact that two-thirds of the infections were in Iran is an important clue, along with the specifics of the payload discussed later, that Iran was the intended target. This count of one hundred thousand infected hosts probably severely undercounts the true number. Symantec only found and monitored two command and control servers; there could have been others. Furthermore, many infections would have been in peer-to-peer botnets without direct connections to those servers.
    • W32. Stuxnet Dossier , pp. 5-7
    • Falliere1
  • 139
    • 84881621939 scopus 로고    scopus 로고
    • note
    • Because it is almost impossible to measure computer security, antivirus firms compete by producing free threat analysis to advertise their technical competence. I am grateful to Stefan Savage for this point.
  • 140
    • 0032222263 scopus 로고    scopus 로고
    • Offense, Defense, and the Causes of War
    • Stephen W. Van Evera, "Offense, Defense, and the Causes of War, " International Security 22, no. 4 (Spring 1998): 5-43.
    • (1998) International Security , vol.22 , Issue.4 , pp. 5-43
    • van Evera, S.W.1
  • 141
    • 0031087039 scopus 로고    scopus 로고
    • What Is the Offense-Defense Balance and Can We Measure It?
    • Charles L. Glaser and Chaim Kaufmann, "What Is the Offense-Defense Balance and Can We Measure It?" International Security 22, no. 4 (Spring 1998): 44-82.
    • (1998) International Security , vol.22 , Issue.4 , pp. 44-82
    • Glaser, C.L.1    Kaufmann, C.2
  • 142
    • 0033471186 scopus 로고    scopus 로고
    • Must War Find a Way? A Review Essay
    • Richard K. Betts, "Must War Find a Way? A Review Essay, " International Security 24, no. 2 (Fall 1999): 166-98.
    • (1999) International Security , vol.24 , Issue.2 , pp. 166-198
    • Betts, R.K.1
  • 143
    • 84881635400 scopus 로고    scopus 로고
    • note
    • Although a degree of homogenization in the centrifuge cascades did facilitate engineering the payload in the first place, the potential uncertainties of the physical plant were much greater. Stuxnet's covert yet promiscuous propagation enabled it to burrow deep into the network without advance knowledge of the best route to the centrifuges. The homogeneity of Windows operating systems on Iranian hosts enabled the worm to use the same tricks again and again to perform a random walk through Iran's networks. If it reproduced enough copies of itself, then eventually some of them would get to the right place and Stuxnet's handlers would receive feedback of mission progress. Yet even these tricks did not deal with all the frictions Stuxnet encountered. Viral propagation enabled Stuxnet to cope with uncertainty about Iran's network configuration, but it ultimately led to the compromise of the operation.
  • 144
    • 0035612301 scopus 로고    scopus 로고
    • Virtual Webs, Physical Technologies, and Hidden Workers: The Spaces of Labor in Information Internetworks
    • note
    • Greg Downey, "Virtual Webs, Physical Technologies, and Hidden Workers: The Spaces of Labor in Information Internetworks, " Technology and Culture 42, no. 2 (April 2001): 209-35.
    • (2001) Technology and Culture , vol.42 , Issue.2 , pp. 209-235
    • Downey, G.1
  • 145
    • 84881638145 scopus 로고    scopus 로고
    • note
    • Of course, there are areas where soldiers can exploit offense dominance in cyberspace, especially in those operations such as intelligence reconnaissance or psychological influence operations where soldiers behave more like spies or hacktivists. Specification of scope conditions could also help to identify a more narrow set of ICS targets and situations (e.g., surprise attack versus protracted war) where cyber warfare might be more feasible.
  • 146
    • 0003649325 scopus 로고
    • note
    • On the difference between deterrence by punishment and denial (or defense), see Glenn Snyder, Deterrence and Defense: Toward a Theory of National Security (Westport, CT: Greenwood Press, 1961), 14-16. I henceforth use "deterrence" to refer to the threat of retaliatory punishment.
    • (1961) Deterrence and Defense: Toward a Theory of National Security , pp. 14-16
    • Snyder, G.1
  • 148
    • 84881619128 scopus 로고    scopus 로고
    • Facing Cyberattack, Iranian Officials Disconnect Some Oil Terminals from Internet
    • note
    • Thomas Erdbrink, "Facing Cyberattack, Iranian Officials Disconnect Some Oil Terminals from Internet, " New York Times, 23 April 2012.
    • (2012) New York Times
    • Erdbrink, T.1
  • 149
    • 84959195552 scopus 로고    scopus 로고
    • Iran Blamed for Cyberattacks on U.S. Banks and Companies
    • note
    • Ellen Nakashima, "Iran Blamed for Cyberattacks on U.S. Banks and Companies, " Washington Post, 21 September 2012.
    • (2012) Washington Post
    • Nakashima, E.1
  • 150
    • 71249119772 scopus 로고    scopus 로고
    • U.S. Rejected Aid for Israeli Raid on Iranian Nuclear Site
    • note
    • David E. Sanger, "U.S. Rejected Aid for Israeli Raid on Iranian Nuclear Site, " New York Times, 10 January 2009.
    • (2009) New York Times
    • Sanger, D.E.1
  • 156
    • 84881620685 scopus 로고    scopus 로고
    • Stuxnet Infected Chevron's IT Network
    • Rachael King, "Stuxnet Infected Chevron's IT Network, " Wall Street Journal, 8 November 2012.
    • (2012) Wall Street Journal
    • King, R.1
  • 157
    • 84881628456 scopus 로고    scopus 로고
    • Iran's Nuclear Negotiator Says U.S. Involved in Cyberattack
    • note
    • Interview with Saeed Jalili, "Iran's Nuclear Negotiator Says U.S. Involved in Cyberattack, " NBC News, 17 January 2011, http://video.msnbc.msn.com/nightly-news/41124888#41124888. Of course, for all the reasons in this paragraph, Iran would have good reason to suspect the United States, so the reliability of Iranian statements should be discounted. We do not know just what sort of evidence they may or may not have found.
    • (2011) NBC News
    • Jalili, S.1
  • 158
  • 159
  • 160
    • 84922252846 scopus 로고    scopus 로고
    • Richard Clarke on Who Was Behind the Stuxnet Attack
    • note
    • Ron Rosenbaum, "Richard Clarke on Who Was Behind the Stuxnet Attack, " Smithsonian, April 2012.
    • (2012) Smithsonian
    • Rosenbaum, R.1
  • 161
  • 162
    • 84956713080 scopus 로고    scopus 로고
    • Code in Aramco Cyber Attack Indicates Lone Perpetrator
    • note
    • Michael Riley and Eric Engleman, "Code in Aramco Cyber Attack Indicates Lone Perpetrator, " Bloomberg, 25 October 2012.
    • (2012) Bloomberg
    • Riley, M.1    Engleman, E.2
  • 163
    • 84881624405 scopus 로고    scopus 로고
    • note
    • This dynamic recalls the stability-instability paradox of classical nuclear deterrence theory: nuclear deterrent stability can promote limited conventional instability.
  • 164
    • 0032222263 scopus 로고    scopus 로고
    • Offense, Defense, and the Causes of War
    • note
    • A dangerous situation, recalling the WWI context of original debate on offense-defense theory, would be if an actor believed cyberwar was offense dominant when it was really defense dominant. Stephen W. Van Evera, "Offense, Defense, and the Causes of War, " International Security 22, no. 4 (Spring 1998): 5-43. This misperception is certainly not helped by most of the rhetoric on the topic.
    • (1998) International Security , vol.22 , Issue.4 , pp. 5-43
    • van Evera, S.W.1
  • 166
    • 84877356343 scopus 로고    scopus 로고
    • note
    • Francis J. Gavin, Nuclear Statecraft: History and Strategy in America's Atomic Age (Ithaca, NY: Cornell University Press, 2012) argues that even afterward the Nuclear Revolution lacked the clarity often assumed. Throughout the Cold War, there was something of a gap between the strategic consequences theorists expected from the Nuclear Revolution and the more pragmatic concerns of policymakers. A similar gap appears to be opening for the Cyber Revolution.
    • (2012) Nuclear Statecraft: History and Strategy in America's Atomic Age
    • Gavin, F.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.