2018 IEEE Security and Privacy Workshops (SPW) 2018
DOI: 10.1109/spw.2018.00050
|View full text |Cite
|
Sign up to set email alerts
|

A Mathematical Modeling of Exploitations and Mitigation Techniques Using Set Theory

Abstract: One of the most challenging problems in computer security is formalization of vulnerabilities, exploits, mitigations and their relationship. In spite of various existing researches and theories, a mathematical model that can be used to quantitatively represent and analyze exploit complexity and mitigation effectiveness is still in absence.In this work, we introduce a novel way of modeling exploits and mitigation techniques with mathematical concepts from set theory and big O notation. The proposed model establ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…Prior works formalized security problems using game theory (e.g., FLIPIT [41], [24]), "weird machines" [10], attack trees [43], Markov models [40], and other methods. Prior notions of attacker quality include O-complexity [9], expected information loss [38], or success probability [30], which is similar to our concept of ∀ versus ∃-attackers. Attacker synthesis work exists in cyber-physical systems [33,5,20,26,30].…”
Section: Related Workmentioning
confidence: 99%
“…Prior works formalized security problems using game theory (e.g., FLIPIT [41], [24]), "weird machines" [10], attack trees [43], Markov models [40], and other methods. Prior notions of attacker quality include O-complexity [9], expected information loss [38], or success probability [30], which is similar to our concept of ∀ versus ∃-attackers. Attacker synthesis work exists in cyber-physical systems [33,5,20,26,30].…”
Section: Related Workmentioning
confidence: 99%
“…Finally, [25] gives an abstract set-theoretic model to evaluate the security level brought by a mitigation scheme with respect to a given set of exploits. However, this model relies on a very high-level quantification on "how much" a mitigation hardens the probability that an exploit occurs (in terms of big O notation).…”
Section: Related Workmentioning
confidence: 99%