Reference : Semantics for specialising attack trees based on linear logic
Scientific journals : Article
Engineering, computing & technology : Computer science
Security, Reliability and Trust
http://hdl.handle.net/10993/34365
Semantics for specialising attack trees based on linear logic
English
Horne, Ross mailto []
Mauw, Sjouke mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
Tiu, Alwen mailto []
2017
Fundamenta Informaticae
IOS Press
153
1-2
57-86
Yes (verified by ORBilu)
International
0169-2968
1875-8681
[en] Attack trees profile the sub-goals of the proponent of an attack. Attack trees have a variety of semantics depending on the kind of question posed about the attack, where questions are captured by an attribute domain. We observe that one of the most general semantics for attack trees, the multiset semantics, coincides with a semantics expressed using linear logic propositions. The semantics can be used to compare attack trees to determine whether one attack tree is a specialisation of another attack tree. Building on these observations, we propose two new semantics for an extension of attack trees named causal attack trees. Such attack trees are extended with an operator capturing the causal order of sub-goals in an attack. These two semantics extend the multiset semantics to sets of series-parallel graphs closed under certain graph homomorphisms, where each semantics respects a class of attribute domains. We define a sound logical system with respect to each of these semantics, by using a recently introduced extension of linear logic, called MAV , featuring a non-commutative operator. The non-commutative operator models causal dependencies in causal attack trees. Similarly to linear logic for attack trees, implication defines a decidable preorder for specialising causal attack trees that soundly respects a class of attribute domains.
Researchers
http://hdl.handle.net/10993/34365
10.3233/FI-2017-1531
FnR ; FNR5809105 > Sjouke Mauw > ADT2P > Attack-Defence Trees: Theory Meets Practice > 01/07/2014 > 30/06/2017 > 2013

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Open access
HMT17.pdfAuthor preprint712.94 kBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.