Proceedings of the 13th International Conference on Availability, Reliability and Security 2018
DOI: 10.1145/3230833.3232799
|View full text |Cite
|
Sign up to set email alerts
|

A Meta Language for Threat Modeling and Attack Simulations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
75
0
2

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 88 publications
(77 citation statements)
references
References 23 publications
0
75
0
2
Order By: Relevance
“…Domain-specific attack languages can be used to make the creation of new attack graphs and threat models cheap and efficient (Johnson et al 2018). Such languages can clarify the reasoning of a generic attack in a specific domain and facilitate the modeling or instantiating of a specific system in that domain.…”
Section: Threat Modelingmentioning
confidence: 99%
“…Domain-specific attack languages can be used to make the creation of new attack graphs and threat models cheap and efficient (Johnson et al 2018). Such languages can clarify the reasoning of a generic attack in a specific domain and facilitate the modeling or instantiating of a specific system in that domain.…”
Section: Threat Modelingmentioning
confidence: 99%
“…The Meta Attack Language (MAL) [26] allows generating attack graphs automatically for a specific software system domain (cloud computing or embedded systems). Attack graphs represent the dependencies between the steps that may be performed by the attacker to compromise the software system.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Previous work [22][23][24][25][26] allows generating threat models and providing assistance to companies to manage the security process. However, it is not suitable to represent security incidents in software systems and identify method executions that should be logged, automatically.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Another example is coreLang, which as its name suggests is a core modeling language that contains the most common IT entities and attack steps. coreLang is included in the presentation of MAL [9].…”
Section: Related Workmentioning
confidence: 99%
“…As the previous approaches rely on a static implementation, we propose the use of MAL (the Meta Attack Language) [9]. This framework for domain-specific languages (DSLs) defines which information about a system is required and specifies the generic attack logic.…”
Section: Introductionmentioning
confidence: 99%