A mathematical modeling of exploitations and mitigation techniques using set Theory

2Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.

Abstract

One of the most challenging problems in computer security is formalization of vulnerabilities, exploits, mitigations and their relationship. In spite of various existing researches and theories, a mathematical model that can be used to quantitatively represent and analyze exploit complexity and mitigation effectiveness is still in absence. In this work, we introduce a novel way of modeling exploits and mitigation techniques with mathematical concepts from set theory and big O notation. The proposed model establishes formulaic relationships between exploit primitives and exploit objectives, and enables the quantitative evaluation of vulnerabilities and security features in a system. We demonstrate the application of this model with two real world mitigation techniques. It serves as the first step toward a comprehensive mathematical understanding and modeling of exploitations and mitigations, which will largely benefit and facilitate the practice of system security assessment.

Cite

CITATION STYLE

APA

Branco, R., Hu, K., Kawakami, H., & Sun, K. (2018). A mathematical modeling of exploitations and mitigation techniques using set Theory. In Proceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018 (pp. 323–328). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/SPW.2018.00050

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free