2019 24th International Conference on Engineering of Complex Computer Systems (ICECCS) 2019
DOI: 10.1109/iceccs.2019.00015
|View full text |Cite
|
Sign up to set email alerts
|

Squeezing State Spaces of (Attack-Defence) Trees

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2
2
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…Petrucci et al extend in [Pet+19] this latter work with a reduction technique dedicated to trees, allowing for a faster checking process. It consists in using the layered structure present in a tree, in particular an attack tree, to ignore some of the interleavings when exploring the tree.…”
Section: Attack-defense Treesmentioning
confidence: 99%
“…Petrucci et al extend in [Pet+19] this latter work with a reduction technique dedicated to trees, allowing for a faster checking process. It consists in using the layered structure present in a tree, in particular an attack tree, to ignore some of the interleavings when exploring the tree.…”
Section: Attack-defense Treesmentioning
confidence: 99%
“…Intuitively, each node of the ADTree corresponds to a single automaton in the resulting network. Specific patterns, embedding reductions to minimise state space explosion [4], are used for different types of ADTree constructs. As the specifics exceed the scope and space of this paper, we refer the reader to [18] for the AMAS semantics, and to [5] for the details on the translation.…”
Section: B Translation To Extended Amasmentioning
confidence: 99%
“…They provide a simple graphical formalism of possible attacker's actions to be taken in order to attack a system and the defender's defences employed to protect the system. Recently, it has been proposed to model ADTrees in the formalism of asynchronous multi-agent systems (AMAS) extended with certain ADTree characteristics [4], [5]. In this setting, one can reason about attack/defence scenarios considering agent distributions over tree nodes and their impact on the feasibility and performance (quantified by metrics such as time and cost) of attacking and defending strategies executed by specific coalitions.…”
Section: Introductionmentioning
confidence: 99%