Cyber security threat modeling based on the MITRE Enterprise ATT&CK Matrix
Enterprise systems are growing in complexity, and the adoption of cloud and mobile
services has greatly increased the attack surface. To proactively address these security …
services has greatly increased the attack surface. To proactively address these security …
[HTML][HTML] Two decades of cyberattack simulations: A systematic literature review
V Engström, R Lagerström - Computers & Security, 2022 - Elsevier
Cyberattack simulations appear across multiple computer security domains and are
interpreted in many different but equally viable ways. However, this makes the topic appear …
interpreted in many different but equally viable ways. However, this makes the topic appear …
[HTML][HTML] The meta attack language-a formal description
Nowadays, IT infrastructures are involved in making innumerable aspects of our lives
convenient, starting with water or energy distribution systems, and ending with e-commerce …
convenient, starting with water or energy distribution systems, and ending with e-commerce …
Yet another cybersecurity risk assessment framework
IT systems pervade our society more and more, and we become heavily dependent on them.
At the same time, these systems are increasingly targeted in cyberattacks, making us …
At the same time, these systems are increasingly targeted in cyberattacks, making us …
Integrating security behavior into attack simulations
The increase of cyber-attacks raised security concerns for critical assets worldwide in the
last decade. Leading to more efforts spent towards increasing the cyber security among …
last decade. Leading to more efforts spent towards increasing the cyber security among …
Measuring and achieving test coverage of attack simulations extended version
S Hacks, L Persson, N Hersén - Software and Systems Modeling, 2023 - Springer
Designing secure and reliable systems is a difficult task. Threat modeling is a process that
supports the secure design of systems by easing the understanding of the system's …
supports the secure design of systems by easing the understanding of the system's …
Towards automation of threat modeling based on a semantic model of attack patterns and weaknesses
A Brazhuk - arxiv preprint arxiv:2112.04231, 2021 - arxiv.org
This works considers challenges of building and usage a formal knowledge base (model),
which unites the ATT&CK, CAPEC, CWE, CVE security enumerations. The proposed model …
which unites the ATT&CK, CAPEC, CWE, CVE security enumerations. The proposed model …
Estimating time-to-compromise for industrial control system attack techniques through vulnerability data
E Rencelj Ling, M Ekstedt - SN Computer Science, 2023 - Springer
Abstract When protecting the Industrial Control Systems against cyber attacks, it is important
to have as much information as possible to allocate defensive resources properly. In this …
to have as much information as possible to allocate defensive resources properly. In this …
Security Analysis of Smart Grids
An attack graph is a beneficial tool to network defenders, demonstrating the routes that an
attacker can utilize to acquire entry to a target network. Cyber‐attacks endanger the security …
attacker can utilize to acquire entry to a target network. Cyber‐attacks endanger the security …
[PDF][PDF] Estimating the Time-To-Compromise of Exploiting Industrial Control System Vulnerabilities.
ER Ling, M Ekstedt - ICISSP, 2022 - pdfs.semanticscholar.org
The metric Time-To-Compromise (TTC) can be used for estimating the time taken for an
attacker to compromise a component or a system. The TTC helps to identify the most critical …
attacker to compromise a component or a system. The TTC helps to identify the most critical …