A survey of MulVAL extensions and their attack scenarios coverage
Organizations employ various adversary models to assess the risk and potential impact of
attacks on their networks. A popular method of visually representing cyber risks is the attack …
attacks on their networks. A popular method of visually representing cyber risks is the attack …
[HTML][HTML] A model-based mode-switching framework based on security vulnerability scores
Software vulnerabilities can affect critical systems within an organization impacting
processes, workflows, privacy, and safety. When a software vulnerability becomes known …
processes, workflows, privacy, and safety. When a software vulnerability becomes known …
Protecting sensitive data in the cloud-to-edge continuum: The FogProtect approach
Data produced by end devices like smartphones, sensors or IoT devices can be stored and
processed across a continuum of compute resources, from end devices via fog nodes to the …
processed across a continuum of compute resources, from end devices via fog nodes to the …
Towards model co-evolution across self-adaptation steps for combined safety and security analysis
Self-adaptive systems offer several attack surfaces due to the communication via different
channels and the different sensors required to observe the environment. Often, attacks …
channels and the different sensors required to observe the environment. Often, attacks …
A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive Systems
Security attacks present unique challenges to the design of self-adaptation mechanism for
software-intensive systems due to the adversarial nature of the environment. Game …
software-intensive systems due to the adversarial nature of the environment. Game …
Design and implementation of self-protecting systems: A formal approach
C Skandylas, N Khakpour - Future Generation Computer Systems, 2021 - Elsevier
As threats to computer security become more common, complex and frequent, systems that
can automatically protect themselves from attacks are imminently needed. In this paper, we …
can automatically protect themselves from attacks are imminently needed. In this paper, we …
A model-based approach for self-adaptive security in CPS: Application to smart grids
Security risk assessment is an important challenge in the design of Cyber Physical Systems
(CPS). Even more importantly, the intrinsically dynamical nature of these systems, due to …
(CPS). Even more importantly, the intrinsically dynamical nature of these systems, due to …
Expressive and systematic risk assessments with instance-centric threat models
S Verreydt, D Van Landuyt, W Joosen - Proceedings of the 38th ACM …, 2023 - dl.acm.org
A threat modeling exercise involves systematically assessing the likelihood and potential
impact of diverse threat scenarios. As threat modeling approaches and tools act at the level …
impact of diverse threat scenarios. As threat modeling approaches and tools act at the level …
Self-protection against business logic vulnerabilities
S Zeller, N Khakpour, D Weyns, D Deogun - Proceedings of the IEEE …, 2020 - dl.acm.org
Attacks against business logic rules occur when the attacker exploits the domain rules in a
malicious way. Such attacks have not received sufficient attention in research so far. In this …
malicious way. Such attacks have not received sufficient attention in research so far. In this …
Adaptive trust-aware decentralized information flow control
C Skandylas, N Khakpour… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Modern software systems are decentralized, distributed, and dynamic, and consequently,
require decentralized mechanisms to enforce security. In this paper, we propose an adaptive …
require decentralized mechanisms to enforce security. In this paper, we propose an adaptive …