Beyond 2014: Formal Methods for Attack Tree--based Security Modeling
W Wideł, M Audinot, B Fila, S Pinchinat - ACM Computing Surveys …, 2019 - dl.acm.org
Attack trees are a well established and commonly used framework for security modeling.
They provide a readable and structured representation of possible attacks against a system …
They provide a readable and structured representation of possible attacks against a system …
Towards synthesis of attack trees for supporting computer-aided risk analysis
Attack trees are widely used in the fields of defense for the analysis of risks (or threats)
against electronics systems, computer control systems or physical systems. Based on the …
against electronics systems, computer control systems or physical systems. Based on the …
[HTML][HTML] Survey: automatic generation of attack trees and attack graphs
Graphical security models constitute a well-known, user-friendly way to represent the
security of a system. These classes of models are used by security experts to identify …
security of a system. These classes of models are used by security experts to identify …
Attack–defense trees
B Kordy, S Mauw, S Radomirović… - Journal of Logic and …, 2014 - academic.oup.com
Attack–defense trees are a novel methodology for graphical security modelling and
assessment. They extend the well-known formalism of attack trees by allowing nodes that …
assessment. They extend the well-known formalism of attack trees by allowing nodes that …
ATSyRa: An Integrated Environment for Synthesizing Attack Trees: (Tool Paper)
Attack trees are widely considered in the fields of security for the analysis of risks (or threats)
against electronics, computer control, or physical systems. A major barrier is that attack trees …
against electronics, computer control, or physical systems. A major barrier is that attack trees …
On quantitative analysis of attack–defense trees with repeated labels
B Kordy, W Wideł - Principles of Security and Trust: 7th International …, 2018 - Springer
Ensuring security of complex systems is a difficult task that requires utilization of numerous
tools originating from various domains. Among those tools we find attack–defense trees, a …
tools originating from various domains. Among those tools we find attack–defense trees, a …
Efficient and generic algorithms for quantitative attack tree analysis
M Lopuhaä-Zwakenberg, CE Budde… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Numerous analysis methods for quantitative attack tree analysis have been proposed.
These algorithms compute relevant security metrics, ie, performance indicators that quantify …
These algorithms compute relevant security metrics, ie, performance indicators that quantify …
On the meaning and purpose of attack trees
Attack trees are a popular notation for describing threats to systems, both in academia and
industry. Originally, attack trees lacked a formal semantics, but formal semantics for different …
industry. Originally, attack trees lacked a formal semantics, but formal semantics for different …
Quantitative questions on attack–defense trees
B Kordy, S Mauw, P Schweitzer - … , Seoul, Korea, November 28-30, 2012 …, 2013 - Springer
Attack–defense trees are a novel methodology for graphical security modeling and
assessment. The methodology includes intuitive and formal components that can be used …
assessment. The methodology includes intuitive and formal components that can be used …
Is my attack tree correct?
M Audinot, S Pinchinat, B Kordy - … on Research in Computer Security, Oslo …, 2017 - Springer
Attack trees are a popular way to represent and evaluate potential security threats on
systems or infrastructures. The goal of this work is to provide a framework allowing to …
systems or infrastructures. The goal of this work is to provide a framework allowing to …