Skip to Content

Security Guru Pledges to Strengthen Critical Computers

Computer-security researcher Eugene Kaspersky says he is testing control software that won’t run malicious code.
November 23, 2012

Stuxnet, a piece of malicious software discovered in 2010, targeted industrial software controlling Iran’s uranium-enrichment centrifuges. But the code got loose—and it continues to spread: Chevron, for example, said last week that its network had been infected by Stuxnet.

Malware fighter: Eugene Kaspersky says his company is developing a secure operating system for industrial control systems.

The prospect that malware like Stuxnet could infect and disrupt critical pieces of infrastructure worries government officials (see “Old-Fashioned Control Systems Make U.S. Power Grids, Water Plants a Hacking Target”) and computer scientists like Eugene Kaspersky, CEO of the Moscow-based antivirus company Kaspersky Lab. He has been talking about building secure operating systems for industrial systems, a subject he discussed with MIT Technology Review.

How far has Stuxnet or similar malicious software spread beyond the intended target? What damage or costs are known to have resulted?

I am sure there are more critical companies, critical to national economic and national security, infected by Stuxnet. Unfortunately I don’t have any hard data on this. Stuxnet had infected an estimated 100,000 machines in approximately 30,000 organizations in the month of September 2010.

You say youre working on a secure operating system for industrial systems. What is your proposed solution?

There is only one way to ensure sufficient protection—a secure OS to guarantee there is no unwanted code executed in this environment. This is achieved with a micro-kernel system that, by design, will not allow execution of unauthorized code.

Where does your secure OS stand?

A prototype is ready. We are working with a couple of companies—I cannot disclose which ones yet, but one of them is a large energy-generating company—in developing the prototype to protect the industrial environment, to make sure there are no critical mistakes in our system. Yes, there will be flaws in the current code, but I want to be sure the core ideas of the OS work. These companies also have to develop secure applications to run on the platform.

What “ideas of the OS” are you referring to?

The main idea is that any and all activity will be visible to administrators, and that undeclared functions will be impossible. Existing operating systems have not been created with security in mind. For the majority of them, security is an optional extra, meaning vulnerabilities are inherent in their underlying architecture. The new OS is based on the principles of security.

Of course, we are not ignoring what other operating systems have already achieved [in becoming more secure], but we believe the level of security afforded to them is not enough given the rate at which today’s threats are progressing.

Why can’t we have this level of security on all computers, and not just ones in critical infrastructure?

Use of our secure OS could certainly extend beyond critical infrastructure, and include any organization who values security. We expect that enhanced security requirements will be promoted primarily by government agencies and will apply both to private and to government-owned facilities.

What about defending critical infrastructure with redundant systems, or manual ones?

Hybrid redundant systems and manual systems can help, but new industrial systems are more and more computer controlled. It is cheaper and easier to design. Even the newer American prisons are controlled digitally, and not manually, so these systems are also vulnerable for Stuxnet-like attacks.

Keep Reading

Most Popular

The miracle molecule that could treat brain injuries and boost your fading memory

Discovered more than a decade ago, a remarkable compound shows promise in treating everything from Alzheimer’s to brain injuries—and it just might improve your cognitive abilities.

wet market selling fish
wet market selling fish

This scientist now believes covid started in Wuhan’s wet market. Here’s why.

How a veteran virologist found fresh evidence to back up the theory that covid jumped from animals to humans in a notorious Chinese market—rather than emerged from a lab leak.

Conceptual illustration showing a file folder with the China flag and various papers flying out of it
Conceptual illustration showing a file folder with the China flag and various papers flying out of it

The US crackdown on Chinese economic espionage is a mess. We have the data to show it.

The US government’s China Initiative sought to protect national security. In the most comprehensive analysis of cases to date, MIT Technology Review reveals how far it has strayed from its goals.

conceptual illustration showing various women's faces being scanned
conceptual illustration showing various women's faces being scanned

A horrifying new AI app swaps women into porn videos with a click

Deepfake researchers have long feared the day this would arrive.

Stay connected

Illustration by Rose WongIllustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at with a list of newsletters you’d like to receive.