New
York Times: Eric Chien, Nicolas Falliere, and Liam Murchu
of Symantec, the world's largest maker of computer security
software, have figured out how the Stuxnet worm was able to
disable the centrifuges that enrich uranium for Iran's nuclear
program. According to the Symantec analysis, Stuxnet targeted
frequency controllers, the devices that govern how fast the
centrifuges spin. Stuxnet instructed the controllers to speed
up and slow down erratically, rendering the centrifuges
useless. As the
New York Times's William Broad and David Sanger
report, Stuxnet's paternity remains in doubt, although Israel
is the prime suspect.
Skip Nav Destination
© 2010 American Institute of Physics
Worm disabled Iran's nuclear centrifuges via their frequency controllers Free
19 November 2010
DOI:https://doi.org/10.1063/PT.5.024844
Content License:FreeView
EISSN:1945-0699
Q&A: Tam O’Shaughnessy honors Sally Ride’s courage and character
Jenessa Duncombe
Ballooning in Albuquerque: What’s so special?
Michael Anand
Comments on early space controversies
W. David Cummings; Louis J. Lanzerotti