Cyber security threat modeling based on the MITRE Enterprise ATT&CK Matrix

W **ong, E Legrand, O Åberg, R Lagerström - Software and Systems …, 2022 - Springer
Enterprise systems are growing in complexity, and the adoption of cloud and mobile
services has greatly increased the attack surface. To proactively address these security …

[HTML][HTML] Two decades of cyberattack simulations: A systematic literature review

V Engström, R Lagerström - Computers & Security, 2022 - Elsevier
Cyberattack simulations appear across multiple computer security domains and are
interpreted in many different but equally viable ways. However, this makes the topic appear …

[HTML][HTML] The meta attack language-a formal description

W Wideł, S Hacks, M Ekstedt, P Johnson… - Computers & …, 2023 - Elsevier
Nowadays, IT infrastructures are involved in making innumerable aspects of our lives
convenient, starting with water or energy distribution systems, and ending with e-commerce …

Yet another cybersecurity risk assessment framework

M Ekstedt, Z Afzal, P Mukherjee, S Hacks… - International Journal of …, 2023 - Springer
IT systems pervade our society more and more, and we become heavily dependent on them.
At the same time, these systems are increasingly targeted in cyberattacks, making us …

Integrating security behavior into attack simulations

S Hacks, I Butun, R Lagerström, A Buhaiu… - Proceedings of the 16th …, 2021 - dl.acm.org
The increase of cyber-attacks raised security concerns for critical assets worldwide in the
last decade. Leading to more efforts spent towards increasing the cyber security among …

Measuring and achieving test coverage of attack simulations extended version

S Hacks, L Persson, N Hersén - Software and Systems Modeling, 2023 - Springer
Designing secure and reliable systems is a difficult task. Threat modeling is a process that
supports the secure design of systems by easing the understanding of the system's …

Towards automation of threat modeling based on a semantic model of attack patterns and weaknesses

A Brazhuk - arxiv preprint arxiv:2112.04231, 2021 - arxiv.org
This works considers challenges of building and usage a formal knowledge base (model),
which unites the ATT&CK, CAPEC, CWE, CVE security enumerations. The proposed model …

Estimating time-to-compromise for industrial control system attack techniques through vulnerability data

E Rencelj Ling, M Ekstedt - SN Computer Science, 2023 - Springer
Abstract When protecting the Industrial Control Systems against cyber attacks, it is important
to have as much information as possible to allocate defensive resources properly. In this …

Security Analysis of Smart Grids

M Ibrahim, R Elhafiz - Security and Communication Networks, 2022 - Wiley Online Library
An attack graph is a beneficial tool to network defenders, demonstrating the routes that an
attacker can utilize to acquire entry to a target network. Cyber‐attacks endanger the security …

[PDF][PDF] Estimating the Time-To-Compromise of Exploiting Industrial Control System Vulnerabilities.

ER Ling, M Ekstedt - ICISSP, 2022 - pdfs.semanticscholar.org
The metric Time-To-Compromise (TTC) can be used for estimating the time taken for an
attacker to compromise a component or a system. The TTC helps to identify the most critical …