2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE) 2017
DOI: 10.1109/hase.2017.12
|View full text |Cite
|
Sign up to set email alerts
|

Quantitative Security and Safety Analysis with Attack-Fault Trees

Abstract: Abstract-Cyber physical systems, like power plants, medical devices and data centers have to meet high standards, both in terms of safety (i.e. absence of unintentional failures) and security (i.e. no disruptions due to malicious attacks).This paper presents attack fault trees (AFTs), a formalism that marries fault trees (safety) and attack trees (security). We equip AFTs with stochastic model checking techniques, enabling a rich plethora of qualitative and quantitative analyses. Qualitative metrics pinpoint t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
93
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 81 publications
(93 citation statements)
references
References 31 publications
0
93
0
Order By: Relevance
“…The leaves of the tree model are either basic component failures (BCF) or basic attack steps (BAS). Since subtrees can be shared in the literature (see e. g., [KS17]), AFTs are actually directed acyclic graphs, rather than trees. In this paper, we consider only trees without shared gates or leaves.…”
Section: Attack-fault Treesmentioning
confidence: 99%
See 4 more Smart Citations
“…The leaves of the tree model are either basic component failures (BCF) or basic attack steps (BAS). Since subtrees can be shared in the literature (see e. g., [KS17]), AFTs are actually directed acyclic graphs, rather than trees. In this paper, we consider only trees without shared gates or leaves.…”
Section: Attack-fault Treesmentioning
confidence: 99%
“…12 in Appendix C for a screenshot of the tool). Then, different translations are available: 1 t o p l e v e l "A" ; 2 "A" or "B" "C " ; 3 "B" mintime =50 maxtime =100 c o s t = 5 0 ; 4 "C" mintime =30 maxtime =70 c o s t = 3 0 ; Figure 7: Example of Galileo attack-tree one quite interesting is the translation into an Uppaal file, for instance a network of stochastic timed automata [KS17]. ATTop takes the ATMM and translates it in its Uppaal metamodel, then serializes it into an Uppaal formatted file.…”
Section: B Translation From Afts To Pwtasmentioning
confidence: 99%
See 3 more Smart Citations