A survey on the usability and practical applications of graphical security models

JB Hong, DS Kim, CJ Chung, D Huang - Computer Science Review, 2017 - Elsevier
This paper presents and discusses the current state of Graphical Security Models (GrSM), in
terms of four GrSM phases:(i) generation,(ii) representation,(iii) evaluation, and (iv) …

Beyond 2014: Formal Methods for Attack Tree--based Security Modeling

W Wideł, M Audinot, B Fila, S Pinchinat - ACM Computing Surveys …, 2019 - dl.acm.org
Attack trees are a well established and commonly used framework for security modeling.
They provide a readable and structured representation of possible attacks against a system …

[HTML][HTML] Survey: Automatic generation of attack trees and attack graphs

AM Konsta, AL Lafuente, B Spiga, N Dragoni - Computers & Security, 2024 - Elsevier
Graphical security models constitute a well-known, user-friendly way to represent the
security of a system. These classes of models are used by security experts to identify …

ChatGPT knows your attacks: Synthesizing attack trees using LLMs

O Gadyatskaya, D Papuc - International Conference on Data Science and …, 2023 - Springer
Attack trees are a popular method to represent cyberattack scenarios. It is often challenging
for organizations to design attack trees for relevant systems and scenarios, as this requires …

On quantitative analysis of attack–defense trees with repeated labels

B Kordy, W Wideł - Principles of Security and Trust: 7th International …, 2018 - Springer
Ensuring security of complex systems is a difficult task that requires utilization of numerous
tools originating from various domains. Among those tools we find attack–defense trees, a …

Is my attack tree correct?

M Audinot, S Pinchinat, B Kordy - … on Research in Computer Security, Oslo …, 2017 - Springer
Attack trees are a popular way to represent and evaluate potential security threats on
systems or infrastructures. The goal of this work is to provide a framework allowing to …

[HTML][HTML] Verdict: a language and framework for engineering cyber resilient and safe system

B Meng, D Larraz, K Siu, A Moitra, J Interrante, W Smith… - Systems, 2021 - mdpi.com
The ever-increasing complexity of cyber-physical systems is driving the need for assurance
of critical infrastructure and embedded systems. However, traditional methods to secure …

[HTML][HTML] Formal template-based generation of attack–defence trees for automated security analysis

J Bryans, LS Liew, HN Nguyen, G Sabaliauskaite… - Information, 2023 - mdpi.com
Systems that integrate cyber and physical aspects to create cyber-physical systems (CPS)
are becoming increasingly complex, but demonstrating the security of CPS is hard and …

Quantitative security risk modeling and analysis with RisQFLan

MH Ter Beek, A Legay, AL Lafuente, A Vandin - computers & security, 2021 - Elsevier
Abstract Domain-specific quantitative modeling and analysis approaches are fundamental in
scenarios in which qualitative approaches are inappropriate or unfeasible. In this paper, we …

Refinement-aware generation of attack trees

O Gadyatskaya, R Jhawar, S Mauw… - Security and Trust …, 2017 - Springer
Attack trees allow a security analyst to obtain an overview of the potential vulnerabilities of a
system. Due to their refinement structure, attack trees support the analyst in understanding …