Beyond 2014: Formal Methods for Attack Tree--based Security Modeling

W Wideł, M Audinot, B Fila, S Pinchinat - ACM Computing Surveys …, 2019 - dl.acm.org
Attack trees are a well established and commonly used framework for security modeling.
They provide a readable and structured representation of possible attacks against a system …

Towards synthesis of attack trees for supporting computer-aided risk analysis

S Pinchinat, M Acher, D Vojtisek - … Grenoble, France, September 1-2, 2014 …, 2015 - Springer
Attack trees are widely used in the fields of defense for the analysis of risks (or threats)
against electronics systems, computer control systems or physical systems. Based on the …

[HTML][HTML] Survey: automatic generation of attack trees and attack graphs

AM Konsta, AL Lafuente, B Spiga, N Dragoni - Computers & Security, 2024 - Elsevier
Graphical security models constitute a well-known, user-friendly way to represent the
security of a system. These classes of models are used by security experts to identify …

Attack–defense trees

B Kordy, S Mauw, S Radomirović… - Journal of Logic and …, 2014 - academic.oup.com
Attack–defense trees are a novel methodology for graphical security modelling and
assessment. They extend the well-known formalism of attack trees by allowing nodes that …

ATSyRa: An Integrated Environment for Synthesizing Attack Trees: (Tool Paper)

S Pinchinat, M Acher, D Vojtisek - International workshop on graphical …, 2015 - Springer
Attack trees are widely considered in the fields of security for the analysis of risks (or threats)
against electronics, computer control, or physical systems. A major barrier is that attack trees …

On quantitative analysis of attack–defense trees with repeated labels

B Kordy, W Wideł - Principles of Security and Trust: 7th International …, 2018 - Springer
Ensuring security of complex systems is a difficult task that requires utilization of numerous
tools originating from various domains. Among those tools we find attack–defense trees, a …

Efficient and generic algorithms for quantitative attack tree analysis

M Lopuhaä-Zwakenberg, CE Budde… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Numerous analysis methods for quantitative attack tree analysis have been proposed.
These algorithms compute relevant security metrics, ie, performance indicators that quantify …

On the meaning and purpose of attack trees

H Mantel, CW Probst - 2019 IEEE 32nd Computer Security …, 2019 - ieeexplore.ieee.org
Attack trees are a popular notation for describing threats to systems, both in academia and
industry. Originally, attack trees lacked a formal semantics, but formal semantics for different …

Quantitative questions on attack–defense trees

B Kordy, S Mauw, P Schweitzer - … , Seoul, Korea, November 28-30, 2012 …, 2013 - Springer
Attack–defense trees are a novel methodology for graphical security modeling and
assessment. The methodology includes intuitive and formal components that can be used …

Is my attack tree correct?

M Audinot, S Pinchinat, B Kordy - … on Research in Computer Security, Oslo …, 2017 - Springer
Attack trees are a popular way to represent and evaluate potential security threats on
systems or infrastructures. The goal of this work is to provide a framework allowing to …