Numerous analysis methods for quantitative attack tree analysis have been proposed. These algorithms compute relevant security metrics, i.e. performance indicators that quantify how good the security of a system is; typical metrics being the most likely attack, the cheapest, or the most damaging one. However, existing methods are only geared towards specific metrics or do not work on general attack trees. This paper classifies attack trees in two dimensions: proper trees vs. directed acyclic graphs (i.e. with shared subtrees); and static vs. dynamic gates. For three out of these four classes, we propose novel algorithms that work over a generic attribute domain, encompassing a large number of concrete security metrics defined on the attack ...
AbstractThe growing need to find proper countermeasures able to protect critical infrastructures fro...
An attack graph is an abstraction that represents the ways an attacker can violate a security policy...
Cyber breaches have grown exponentially over the years, both in the number of incidents and in damag...
Numerous analysis methods for quantitative attack tree analysis have been proposed. These algorithms...
Attack trees are an important tool in security analysis, and an important part of attack tree analys...
Abstract. Attack–defense trees extend attack trees with defense nodes. This richer formalism allows ...
The success of a security attack crucially depends on the resources available to an attacker: time, ...
The success of a security attack crucially depends on the resources available to an attacker: time, ...
We present the results of research of limiting adversarial budget in attack games, and, in particula...
Attack tree analysis is used to estimate different parameters of general security threats based on i...
The success of a security attack crucially depends on time: the more time available to the attacker,...
peer reviewedAttack trees provide a systematic way of characterizing diverse system threats. Their ...
Attack-defense trees are a novel methodology for graphical security modelling and assessment. They e...
International audienceSecurity analysis is without doubt one of the most important issues in a socie...
Cyber physical systems, like power plants, medical devices and data centers have to meet high standa...
AbstractThe growing need to find proper countermeasures able to protect critical infrastructures fro...
An attack graph is an abstraction that represents the ways an attacker can violate a security policy...
Cyber breaches have grown exponentially over the years, both in the number of incidents and in damag...
Numerous analysis methods for quantitative attack tree analysis have been proposed. These algorithms...
Attack trees are an important tool in security analysis, and an important part of attack tree analys...
Abstract. Attack–defense trees extend attack trees with defense nodes. This richer formalism allows ...
The success of a security attack crucially depends on the resources available to an attacker: time, ...
The success of a security attack crucially depends on the resources available to an attacker: time, ...
We present the results of research of limiting adversarial budget in attack games, and, in particula...
Attack tree analysis is used to estimate different parameters of general security threats based on i...
The success of a security attack crucially depends on time: the more time available to the attacker,...
peer reviewedAttack trees provide a systematic way of characterizing diverse system threats. Their ...
Attack-defense trees are a novel methodology for graphical security modelling and assessment. They e...
International audienceSecurity analysis is without doubt one of the most important issues in a socie...
Cyber physical systems, like power plants, medical devices and data centers have to meet high standa...
AbstractThe growing need to find proper countermeasures able to protect critical infrastructures fro...
An attack graph is an abstraction that represents the ways an attacker can violate a security policy...
Cyber breaches have grown exponentially over the years, both in the number of incidents and in damag...