2021
DOI: 10.48550/arxiv.2105.06731
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

On the Soundness of Infrastructure Adversaries

Abstract: Companies and network operators perform risk assessment to inform policy-making, guide infrastructure investments or to comply with security standards such as ISO 27001. Due to the size and complexity of these networks, risk assessment techniques such as attack graphs or trees describe the attacker with a finite set of rules. This characterization of the attacker can easily miss attack vectors or overstate them, potentially leading to incorrect risk estimation.In this work, we propose the first methodology to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 33 publications
(73 reference statements)
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?