2014 IEEE 27th Computer Security Foundations Symposium 2014
DOI: 10.1109/csf.2014.31
|View full text |Cite
|
Sign up to set email alerts
|

Automated Generation of Attack Trees

Abstract: Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
56
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 59 publications
(56 citation statements)
references
References 30 publications
0
56
0
Order By: Relevance
“…In the example system, both Charlie and Alice own matching assets, so the transformation generates two possible attacks, one using Charlie's card, another using Alice's card. Clearly, the first transformation result does not necessarily represent an attack; generating such unwanted artefacts can either prohibited by restricting permissible actors in the policy, 4 or it can be dealt with in later phases that work on the generated attacks.…”
Section: Transforming the Examplementioning
confidence: 99%
See 2 more Smart Citations
“…In the example system, both Charlie and Alice own matching assets, so the transformation generates two possible attacks, one using Charlie's card, another using Alice's card. Clearly, the first transformation result does not necessarily represent an attack; generating such unwanted artefacts can either prohibited by restricting permissible actors in the policy, 4 or it can be dealt with in later phases that work on the generated attacks.…”
Section: Transforming the Examplementioning
confidence: 99%
“…The generated attack takes account for all combinations hereof; some parts of the tree can be pruned or simplified in a later phase similar to [4]. Once the card and the pin have been obtained, Charlie moves to the location ATM and inputs the asset cash.…”
Section: Transforming the Examplementioning
confidence: 99%
See 1 more Smart Citation
“…Based on these observations, their paper extends dynamic attack tree models using the ordered parallel behavior of AND-and OR-gates. Vigo et al [14] proposed an automated attack tree generator using a static analysis approach. The attack trees are automatically inferred from a process of algebraic specification and Satisfiability Modulo Theories in a syntax-directed fashion while avoiding exponential explosion.…”
Section: Attack Graph Modelsmentioning
confidence: 99%
“…Attack trees provide structure to the represented attacks by relating a node representing the goal of an attack with different alternative or required sub-goals, which an attacker may or must perform. This structure makes attack trees also an appropriate target for automated identification of attacks [4][5][6].…”
Section: Introductionmentioning
confidence: 99%