ABSTRACT

Cyber malwares have been steadily improving in terms of sophistication of design as well as the ability to cause substantial damage to large-scale IT systems. Today’s malwares exploit innumerable vulnerabilities to create a back door for bypassing authentication or securing remote access to

CONTENTS

Introduction ......................................................................................................... 387 Stuxnet Malware .................................................................................................388