Is my attack tree correct?
From MaRDI portal
Abstract: Attack trees are a popular way to represent and evaluate potential security threats on systems or infrastructures. The goal of this work is to provide a framework allowing to express and check whether an attack tree is consistent with the analyzed system. We model real systems using transition systems and introduce attack trees with formally specified node labels. We formulate the correctness properties of an attack tree with respect to a system and study the complexity of the corresponding decision problems. The proposed framework can be used in practice to assist security experts in manual creation of attack trees and enhance development of tools for automated generation of attack trees.
Recommendations
Cites work
- scientific article; zbMATH DE number 3870578 (Why is no real title available?)
- scientific article; zbMATH DE number 2196601 (Why is no real title available?)
- Attack-defense trees
- DAG-based attack and defense modeling: don't miss the forest for the attack trees
- Information Security and Cryptology - ICISC 2005
- Model Checking Exact Cost for Attack Scenarios
- Modelling attack-defense trees using timed automata
- Probabilistic reasoning with graphical security models
- Quantitative attack tree analysis via priced timed automata
- Semantics for specialising attack trees based on linear logic
- The complexity of theorem-proving procedures
Cited in
(11)- Formal Methods for Components and Objects
- Attack trees vs. fault trees: two sides of the same coin from different currencies
- Adversarial formal semantics of attack trees and related problems
- Semantics of attack-defense trees for dynamic countermeasures and a new hierarchy of star-free languages
- A review of attack graph and attack tree visual syntax in cyber security
- Attack-defense trees and two-player binary zero-sum extensive form games are equivalent
- On quantitative analysis of attack-defense trees with repeated labels
- Attribution of attack trees
- Information Security and Cryptology - ICISC 2005
- Attack trees in Isabelle
- DAG-based attack and defense modeling: don't miss the forest for the attack trees
This page was built for publication: Is my attack tree correct?
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2167713)