2016
DOI: 10.1007/978-3-319-48393-1_24
|View full text |Cite
|
Sign up to set email alerts
|

Using Attack-Defense Trees to Analyze Threats and Countermeasures in an ATM: A Case Study

Abstract: Abstract. Securing automated teller machines (ATMs), as critical and complex infrastructure, requires a precise understanding of the associated threats. This paper reports on the application of attack-defense trees to model and analyze the security of ATMs. We capture the most dangerous multi-stage attack scenarios applicable to ATM structures, and establish a practical experience report, where we reflect on the process of modeling ATM threats via attack-defense trees. In particular, we share our insights into… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
29
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 45 publications
(29 citation statements)
references
References 17 publications
0
29
0
Order By: Relevance
“…Attackdefense trees enhance attack trees with nodes labeled with goals of a defender, thus enabling modeling of interactions between the two competing actors. They have been used to evaluate the security of real-life systems, such as ATMs [7], RFID managed warehouses [4] and cyber-physical systems [16]. Both the theoretical developments and the practical studies have proven that attack-defense trees offer a promising methodology for security evaluation, but they also highlighted room for improvements.…”
Section: Introductionmentioning
confidence: 99%
“…Attackdefense trees enhance attack trees with nodes labeled with goals of a defender, thus enabling modeling of interactions between the two competing actors. They have been used to evaluate the security of real-life systems, such as ATMs [7], RFID managed warehouses [4] and cyber-physical systems [16]. Both the theoretical developments and the practical studies have proven that attack-defense trees offer a promising methodology for security evaluation, but they also highlighted room for improvements.…”
Section: Introductionmentioning
confidence: 99%
“…In complex environments it will likely be impractical to apply the bottom-up approach due to the huge amount of potential vulnerability combinations that can be exploited in various attacks. Indeed, in practice attack trees are typically designed in a top-down manner, when the analyst starts by conjecturing the main attacker's goal and iteratively breaks it down into smaller subgoals [40,46,17,47].…”
Section: Related Workmentioning
confidence: 99%
“…In this empirical evaluation section we focus on ATM fraud, because more empirical data is available for these attacks than for the other types of attacks. Figure 3 presents an attack tree characterising such attacks that is loosely based on the attack-defence tree published by Fraile et al [17]. In ATM fraud, criminals need covert access to the ATM, as this attack typically requires opening the machine's case either by force or with a generic key, and installing a special device (e.g.…”
Section: Atm Security: a Case Studymentioning
confidence: 99%
See 1 more Smart Citation
“…The usage of attack defense trees in threat modelling and risk assessment is a widely recognized methodology in information technology. For example, Fraile et al (2016) used attack defense trees to analyze the security of automated teller machines (ATM) (Fraile et al 2016). Based on their practical work, the authors attest attack defense trees a high potential to produce good results in risk assessment.…”
Section: Related Workmentioning
confidence: 99%