2022
DOI: 10.1080/19393555.2022.2106909
|View full text |Cite
|
Sign up to set email alerts
|

Translation of AADL model to security attack tree (TAMSAT) to SMART evaluation of monetary security risk

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…It has been observed that attack trees are more efective for fnding threats in the absence of use-case diagrams [52]. Te graphical representation of the attack tree provides a better understanding of how attacks can be successful and the probability of attacks that are most likely to succeed [53,54]. Te methodology can also reveal the vulnerability of a system, under specifed constraints.…”
Section: Security Requirementsmentioning
confidence: 99%
“…It has been observed that attack trees are more efective for fnding threats in the absence of use-case diagrams [52]. Te graphical representation of the attack tree provides a better understanding of how attacks can be successful and the probability of attacks that are most likely to succeed [53,54]. Te methodology can also reveal the vulnerability of a system, under specifed constraints.…”
Section: Security Requirementsmentioning
confidence: 99%
“…However, there has been a lack of work in developing effective methods for translating system architecture models into an attack tree security model. To this purpose we have created the TAMSAT (Translation of AADL Model to Security Attack Tree) tool which aims to help fill this void by providing a method for converting user defined systems into easy to understand and assess security models [35]. In other words, we wish to enable the translation of an early life-cycle development model into an attack tree structure that can be used to determine the security risk of the model.…”
Section: Tamsatmentioning
confidence: 99%
“…This examination can occur before a specific architecture has been decided, after architectural decisions have been made, and as a method to explore and evaluate the design's choices and constraints. The original publication work for TAMSAT [35] shows how TAMSAT can be utilized repeatedly to evaluate existing designs, determine the validity of the current security constraints and requirements, and highlights how TAMSAT could be used as part of an automatic toolset. In this section we will explain in detail the design of TAMSAT and how it takes an AADL system model and produces an attack tree model.…”
Section: Tamsatmentioning
confidence: 99%