Beyond 2014: Formal Methods for Attack Tree--based Security Modeling

W Wideł, M Audinot, B Fila, S Pinchinat - ACM Computing Surveys …, 2019 - dl.acm.org
Attack trees are a well established and commonly used framework for security modeling.
They provide a readable and structured representation of possible attacks against a system …

[HTML][HTML] Survey: Automatic generation of attack trees and attack graphs

AM Konsta, AL Lafuente, B Spiga, N Dragoni - Computers & Security, 2024 - Elsevier
Graphical security models constitute a well-known, user-friendly way to represent the
security of a system. These classes of models are used by security experts to identify …

A2G2V: Automatic attack graph generation and visualization and its applications to computer and SCADA networks

AT Al Ghazo, M Ibrahim, H Ren… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Securing cyber-physical systems (CPS) and Internet of Things (IoT) systems requires the
identification of how interdependence among existing atomic vulnerabilities may be …

ChatGPT knows your attacks: Synthesizing attack trees using LLMs

O Gadyatskaya, D Papuc - International Conference on Data Science and …, 2023 - Springer
Attack trees are a popular method to represent cyberattack scenarios. It is often challenging
for organizations to design attack trees for relevant systems and scenarios, as this requires …

Modelling attack-defense trees using timed automata

O Gadyatskaya, RR Hansen, KG Larsen… - Formal Modeling and …, 2016 - Springer
Performing a thorough security risk assessment of an organisation has always been
challenging, but with the increased reliance on outsourced and off-site third-party services …

Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0

O Gadyatskaya, R Jhawar, P Kordy, K Lounis… - … Evaluation of Systems, 2016 - Springer
In this tool demonstration paper we present the ADTool2. 0: an open-source software tool for
design, manipulation and analysis of attack trees. The tool supports ranking of attack …

[HTML][HTML] Formal template-based generation of attack–defence trees for automated security analysis

J Bryans, LS Liew, HN Nguyen, G Sabaliauskaite… - Information, 2023 - mdpi.com
Systems that integrate cyber and physical aspects to create cyber-physical systems (CPS)
are becoming increasingly complex, but demonstrating the security of CPS is hard and …

Refinement-aware generation of attack trees

O Gadyatskaya, R Jhawar, S Mauw… - Security and Trust …, 2017 - Springer
Attack trees allow a security analyst to obtain an overview of the potential vulnerabilities of a
system. Due to their refinement structure, attack trees support the analyst in understanding …

Semi-automatically augmenting attack trees using an annotated attack tree library

R Jhawar, K Lounis, S Mauw… - Security and Trust …, 2018 - Springer
We present a method for assisting the semi-automatic creation of attack trees. Our method
allows to explore a library of attack trees, select elements from this library that can be …

New directions in attack tree research: catching up with industrial needs

O Gadyatskaya, R Trujillo-Rasua - … 2017, Santa Barbara, CA, USA, August …, 2018 - Springer
Attack trees provide a systematic way of characterizing diverse system threats. Their
strengths arise from the combination of an intuitive representation of possible attacks and …