2018 IEEE 31st Computer Security Foundations Symposium (CSF) 2018
DOI: 10.1109/csf.2018.00012
|View full text |Cite
|
Sign up to set email alerts
|

Guided Design of Attack Trees: A System-Based Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
15
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(15 citation statements)
references
References 14 publications
0
15
0
Order By: Relevance
“…The resulting attack trees tend to be diverse, which poses a problem from a practical viewpoint. Although several studies [5,9,10] have addressed to this issue, the frameworks they proposed are rather indirect. Therefore, methodologies need to be developed for considering the consistency of attack trees simply.…”
Section: Problem and Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…The resulting attack trees tend to be diverse, which poses a problem from a practical viewpoint. Although several studies [5,9,10] have addressed to this issue, the frameworks they proposed are rather indirect. Therefore, methodologies need to be developed for considering the consistency of attack trees simply.…”
Section: Problem and Resultsmentioning
confidence: 99%
“…To the best of our knowledge, most related studies have explicitly discussed neither guidance for attack decompositions nor the validity of decompositions in detail. Although the research [5,9,10] discussed this issue, their frameworks dealt with attacks only indirectly.…”
Section: Overview Of Attack Treesmentioning
confidence: 99%
See 2 more Smart Citations
“…Attack Trees [21] [22] are a prime example of attack graphs. Their success lies in the ability to provide information on how an attacker can achieve a goal in an intuitive way through simple logical operations of conjunction and disjunction between sub-activity.…”
Section: Attack Treementioning
confidence: 99%