A survey on the usability and practical applications of graphical security models

JB Hong, DS Kim, CJ Chung, D Huang - Computer Science Review, 2017 - Elsevier
This paper presents and discusses the current state of Graphical Security Models (GrSM), in
terms of four GrSM phases:(i) generation,(ii) representation,(iii) evaluation, and (iv) …

Beyond 2014: Formal Methods for Attack Tree--based Security Modeling

W Wideł, M Audinot, B Fila, S Pinchinat - ACM Computing Surveys …, 2019 - dl.acm.org
Attack trees are a well established and commonly used framework for security modeling.
They provide a readable and structured representation of possible attacks against a system …

[HTML][HTML] The meta attack language-a formal description

W Wideł, S Hacks, M Ekstedt, P Johnson… - Computers & …, 2023 - Elsevier
Nowadays, IT infrastructures are involved in making innumerable aspects of our lives
convenient, starting with water or energy distribution systems, and ending with e-commerce …

[HTML][HTML] Survey: Automatic generation of attack trees and attack graphs

AM Konsta, AL Lafuente, B Spiga, N Dragoni - Computers & Security, 2024 - Elsevier
Graphical security models constitute a well-known, user-friendly way to represent the
security of a system. These classes of models are used by security experts to identify …

A2G2V: Automatic attack graph generation and visualization and its applications to computer and SCADA networks

AT Al Ghazo, M Ibrahim, H Ren… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Securing cyber-physical systems (CPS) and Internet of Things (IoT) systems requires the
identification of how interdependence among existing atomic vulnerabilities may be …

Modelling attack-defense trees using timed automata

O Gadyatskaya, RR Hansen, KG Larsen… - Formal Modeling and …, 2016 - Springer
Performing a thorough security risk assessment of an organisation has always been
challenging, but with the increased reliance on outsourced and off-site third-party services …

A review on automatic generation of attack trees and its application to automotive cybersecurity

K Sowka, V Palade, H Jadidbonab… - Artificial Intelligence and …, 2023 - Springer
A comprehensive cybersecurity evaluation of automotive on-board networks has become a
crucial antecedent to the commercial distribution of vehicles. However, the means to perform …

On quantitative analysis of attack–defense trees with repeated labels

B Kordy, W Wideł - Principles of Security and Trust: 7th International …, 2018 - Springer
Ensuring security of complex systems is a difficult task that requires utilization of numerous
tools originating from various domains. Among those tools we find attack–defense trees, a …

Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0

O Gadyatskaya, R Jhawar, P Kordy, K Lounis… - … Evaluation of Systems, 2016 - Springer
In this tool demonstration paper we present the ADTool2. 0: an open-source software tool for
design, manipulation and analysis of attack trees. The tool supports ranking of attack …

Is my attack tree correct?

M Audinot, S Pinchinat, B Kordy - … on Research in Computer Security, Oslo …, 2017 - Springer
Attack trees are a popular way to represent and evaluate potential security threats on
systems or infrastructures. The goal of this work is to provide a framework allowing to …