Fault Trees (FT) are widespread models in the reliability field, but they lack of modelling power. So, in the literature, several extensions have been proposed and introduced specific new modelling primitives. Attack Trees (AT) have gained acceptance in the field of security. They follow the same notation of standard FT,but they represent the combinations of actions necessary for the success of an attack to a computing system. In this paper, we extend the AT formalism by exploiting the new primitives introduced in specific FT extensions. This leads to more accurate models. The approach is applied to a case study: the AT is exploited to represent the attack mode and compute specific quantitative measures about the system security
Attack trees have been developed to describe processes by which malicious users attempt to exploit o...
In this paper, a new method for quantitative security risk assessment of complex systems is presente...
International audienceAttack trees are widely used in the fields of defense for the analysis of risk...
Fault Trees (FT) are widespread models in the reliability field, but they lack of modelling power. So...
Fault Trees are well-known models for the reliability analysis of systems, used to compute several k...
As the critical systems we rely on every day, such as nuclear power plants and airplanes, become eve...
Cyber physical systems, like power plants, medical devices and data centers have to meet high standa...
This is the extended version of the manuscript of the same name published in ACSD 2019.International...
This manuscript is the author version of the manuscript of the same name published in Fundamenta Inf...
There is a need to quantify system properties methodically. Dependability and security models have e...
peer reviewedPerforming a thorough security risk assessment of an organisation has always been chall...
The Fault Tree (FT) is a widespread model in the field of Reliability, but its modeling power is very...
Performing a thorough security risk assessment of an organisation has always been challenging, but w...
In this paper, a new method for quantitative security risk assessment of complex systems is presente...
Attack trees have been developed to describe processes by which malicious users attempt to exploit o...
In this paper, a new method for quantitative security risk assessment of complex systems is presente...
International audienceAttack trees are widely used in the fields of defense for the analysis of risk...
Fault Trees (FT) are widespread models in the reliability field, but they lack of modelling power. So...
Fault Trees are well-known models for the reliability analysis of systems, used to compute several k...
As the critical systems we rely on every day, such as nuclear power plants and airplanes, become eve...
Cyber physical systems, like power plants, medical devices and data centers have to meet high standa...
This is the extended version of the manuscript of the same name published in ACSD 2019.International...
This manuscript is the author version of the manuscript of the same name published in Fundamenta Inf...
There is a need to quantify system properties methodically. Dependability and security models have e...
peer reviewedPerforming a thorough security risk assessment of an organisation has always been chall...
The Fault Tree (FT) is a widespread model in the field of Reliability, but its modeling power is very...
Performing a thorough security risk assessment of an organisation has always been challenging, but w...
In this paper, a new method for quantitative security risk assessment of complex systems is presente...
Attack trees have been developed to describe processes by which malicious users attempt to exploit o...
In this paper, a new method for quantitative security risk assessment of complex systems is presente...
International audienceAttack trees are widely used in the fields of defense for the analysis of risk...