JHAWAR, Ravi ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Kordy, Barbara
MAUW, Sjouke ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Radomirovic, Sasa
TRUJILLO RASUA, Rolando ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
External co-authors :
yes
Language :
English
Title :
Attack Trees with Sequential Conjunction
Publication date :
2015
Event name :
ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015
Event date :
from 26/05/2015 to 28/05/2015
Audience :
International
Main work title :
Proceedings of the 30th IFIP TC 11 International Conference ICT Systems Security and Privacy Protection (SEC 2015)
Publisher :
Springer
ISBN/EAN :
978-3-319-18466-1
Collection name :
IFIP Advances in Information and Communication Technology, volume = 455
Ardi, S., Byers, D., Shahmehri, N.: Towards a structured unified process for software security. In: SESS 2006, pp. 3-10. ACM (2006)
Arnold, F., Hermanns, H., Pulungan, R., Stoelinga, M.: Time-dependent analysis of attacks. In: Abadi, M., Kremer, S. (eds.) POST 2014 (ETAPS 2014). LNCS, vol. 8414, pp. 285-305. Springer, Heidelberg (2014)
Byers, D., Ardi, S., Shahmehri, N., Duma, C.: Modeling software vulnerabilities with vulnerability cause graphs. In: ICSM 2006, pp. 411-422 (2006)
Camtepe, S., Yener, B.: Modeling and detection of complex attacks. In: SecureComm 2007, pp. 234-243. IEEE (2007)
Gischer, J.L.: The Equational Theory of Pomsets. Theor. C. Sc. 61, 199-224 (1988)
Jhawar, R., Kordy, B., Mauw, S., Radomirović, S., Trujillo-Rasua, R.: Attack Trees with Sequential Conjunction. CoRR abs/1503.02261 (2015). http://arxiv.org/abs/1503.02261
Khand, P.A.: System level security modeling using attack trees. In: IC4 2009, pp. 1-6 (2009)
Kordy, B., Kordy, P., Mauw, S., Schweitzer, P.: ADTool: security analysis with attack-defense trees. In: Joshi, K., Siegle, M., Stoelinga, M., D’Argenio, P.R. (eds.) QEST 2013. LNCS, vol. 8054, pp. 173-176. Springer, Heidelberg (2013)
Kordy, B., Mauw, S., Radomirović, S., Schweitzer, P.: Attack-Defense Trees. Journal of Logic and Computation 24(1), 55-87 (2014)
Kordy, B., Piètre-Cambacédès, L., Schweitzer, P.: DAG-Based Attack and Defense Modeling: Don't Miss the Forest for the Attack Trees. Computer Science Review 13-14, 1-38 (2014)
Kordy, B., Pouly, M., Schweitzer, P.: Computational aspects of attack-defense trees. In: Bouvry, P., KŁopotek, M.A., Leprévost, F., Marciniak, M., Mykowiecka, A., Rybiński, H. (eds.) SIIS 2011. LNCS, vol. 7053, pp. 103-116. Springer, Heidelberg (2012)
Kordy, B., Pouly, M., Schweitzer, P.: A probabilistic framework for security scenarios with dependent actions. In: Albert, E., Sekerinski, E. (eds.) IFM 2014. LNCS, vol. 8739, pp. 256-271. Springer, Heidelberg (2014)
Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 186-198. Springer, Heidelberg (2006)
Peine, H., Jawurek, M., Mandel, S.: Security goal indicator trees: a model of software features that supports efficient security inspection. In: HASE 2008, pp. 9-18. IEEE Computer Society (2008)
Piètre-Cambacédès, L., Bouissou, M.: Beyond attack trees: dynamic security modeling with boolean logic driven Markov processes (BDMP). In: EDCC 2010, pp. 199-208. IEEE Computer Society, Los Alamitos (2010)
Pinchinat, S., Acher, M., Vojtisek, D.: Towards synthesis of attack trees for supporting computer-aided risk analysis. In: Canal, C., Idani, A. (eds.) SEFM 2014 Workshops. LNCS, vol. 8938, pp. 363-375. Springer, Heidelberg (2015)
Qin, X., Lee, W.: Attack plan recognition and prediction using causal networks. In: 20th Annual Computer Security Applications Conference, pp. 370-379 (2004)
Roy, A., Kim, D.S., Trivedi, K.S.: Attack Countermeasure Trees (ACT): Towards Unifying the Constructs of Attack and Defense Trees. Security and Communication Networks 5(8), 929-943 (2012)
Schneier, B.: Attack Trees: Modeling Security Threats. Dr. Dobb's Journal of Software Tools 24(12), 21-29 (1999)
Wang, J., Whitley, J.N., Phan, R.C.W., Parish, D.J.: Unified Parametrizable Attack Tree. Int. Journal for Information Security Research 1(1), 20-26 (2011)
Wen-ping, L., Wei-min, L.: Space based information system security risk evaluation based on improved attack trees. In: (MINES 2011), pp. 480-483 (2011)
Jürgenson, A., Willemson, J.: Serial model for attack tree computations. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol. 5984, pp. 118-128. Springer, Heidelberg (2010)