A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

A survey on the usability and practical applications of graphical security models

JB Hong, DS Kim, CJ Chung, D Huang - Computer Science Review, 2017 - Elsevier
This paper presents and discusses the current state of Graphical Security Models (GrSM), in
terms of four GrSM phases:(i) generation,(ii) representation,(iii) evaluation, and (iv) …

APT attacks on industrial control systems: A tale of three incidents

R Kumar, R Kela, S Singh, R Trujillo-Rasua - International Journal of …, 2022 - Elsevier
Modern-day industries are complex socio-technical entities. Understanding the risks
associated with the operation of such systems requires proper consideration of budget …

Towards simulation-based verification of autonomous navigation systems

TA Pedersen, JA Glomsrud, EL Ruud, A Simonsen… - Safety Science, 2020 - Elsevier
Autonomous ships are expected to change water-based transport of both cargo and people,
and large investments are being made internationally. There are many reasons for such …

[HTML][HTML] Survey: Automatic generation of attack trees and attack graphs

AM Konsta, AL Lafuente, B Spiga, N Dragoni - Computers & Security, 2024 - Elsevier
Graphical security models constitute a well-known, user-friendly way to represent the
security of a system. These classes of models are used by security experts to identify …

[HTML][HTML] An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity

N Naik, P Grace, P Jenkins, K Naik, J Song - Computers & Security, 2022 - Elsevier
Abstract Self-Sovereign Identity (SSI) empowers users to govern their digital identity and
personal data. This approach has changed the identity paradigm where users become the …

Beyond 2014: Formal Methods for Attack Tree--based Security Modeling

W Wideł, M Audinot, B Fila, S Pinchinat - ACM Computing Surveys …, 2019 - dl.acm.org
Attack trees are a well established and commonly used framework for security modeling.
They provide a readable and structured representation of possible attacks against a system …

Efficient and generic algorithms for quantitative attack tree analysis

M Lopuhaä-Zwakenberg, CE Budde… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Numerous analysis methods for quantitative attack tree analysis have been proposed.
These algorithms compute relevant security metrics, ie, performance indicators that quantify …

ChatGPT knows your attacks: Synthesizing attack trees using LLMs

O Gadyatskaya, D Papuc - International Conference on Data Science and …, 2023 - Springer
Attack trees are a popular method to represent cyberattack scenarios. It is often challenging
for organizations to design attack trees for relevant systems and scenarios, as this requires …

[HTML][HTML] Systematic threat assessment and security testing of automotive over-the-air (OTA) updates

S Mahmood, HN Nguyen, SA Shaikh - Vehicular Communications, 2022 - Elsevier
Modern cars host numerous special-purpose computing and connectivity devices facilitating
the correct functioning of various in-vehicle systems. These devices host complex software …