Numerous analysis methods for quantitative attack tree analysis have been proposed. These algorithms compute relevant security metrics, i.e. performance indicators that quantify how good the security of a system is; typical metrics being the most likely attack, the cheapest, or the most damaging one. However, existing methods are only geared towards specific metrics or do not work on general attack trees. This paper classifies attack trees in two dimensions: proper trees vs. directed acyclic graphs (i.e. with shared subtrees); and static vs. dynamic gates. For three out of these four classes, we propose novel algorithms that work over a generic attribute domain, encompassing a large number of concrete security metrics defined on the attack ...
The growing need to find proper countermeasures able to protect critical infrastructures from threat...
Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of mul...
International audienceAttack trees are widely used in the fields of defense for the analysis of risk...
Numerous analysis methods for quantitative attack tree analysis have been proposed. These algorithms...
Abstract. Attack–defense trees extend attack trees with defense nodes. This richer formalism allows ...
The success of a security attack crucially depends on the resources available to an attacker: time, ...
The success of a security attack crucially depends on the resources available to an attacker: time, ...
peer reviewedAttack trees provide a systematic way of characterizing diverse system threats. Their ...
Network attacks occur in high proportion on the inter-net, thus aside from security as a means of de...
We introduce and give formal definitions of attack-defense trees. We argue that these trees are a si...
Attack-defense trees are a novel methodology for graphical security modelling and assessment. They e...
peer reviewedAttack trees are considered a useful tool for security modelling because they support q...
Attack trees are an important tool in security analysis, and an important part of attack tree analys...
AbstractThe growing need to find proper countermeasures able to protect critical infrastructures fro...
Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of mul...
The growing need to find proper countermeasures able to protect critical infrastructures from threat...
Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of mul...
International audienceAttack trees are widely used in the fields of defense for the analysis of risk...
Numerous analysis methods for quantitative attack tree analysis have been proposed. These algorithms...
Abstract. Attack–defense trees extend attack trees with defense nodes. This richer formalism allows ...
The success of a security attack crucially depends on the resources available to an attacker: time, ...
The success of a security attack crucially depends on the resources available to an attacker: time, ...
peer reviewedAttack trees provide a systematic way of characterizing diverse system threats. Their ...
Network attacks occur in high proportion on the inter-net, thus aside from security as a means of de...
We introduce and give formal definitions of attack-defense trees. We argue that these trees are a si...
Attack-defense trees are a novel methodology for graphical security modelling and assessment. They e...
peer reviewedAttack trees are considered a useful tool for security modelling because they support q...
Attack trees are an important tool in security analysis, and an important part of attack tree analys...
AbstractThe growing need to find proper countermeasures able to protect critical infrastructures fro...
Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of mul...
The growing need to find proper countermeasures able to protect critical infrastructures from threat...
Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of mul...
International audienceAttack trees are widely used in the fields of defense for the analysis of risk...