Abstract
Attack trees are an important modeling formalism to identify and quantify attacks on security and privacy. They are very useful as a tool to understand step by step the ways through a system graph that lead to the violation of security policies. In this paper, we present how attacks can be refined based on the violation of a policy. To that end we provide a formal definition of attack trees in Isabelle’s Higher Order Logic: a proof calculus that defines how to refine sequences of attack steps into a valid attack. We use a notion of Kripke semantics as formal foundation that then allows to express attack goals using branching time temporal logic CTL. We illustrate the use of the mechanized Isabelle framework on the example of a privacy attack to an IoT healthcare system.
Cite
CITATION STYLE
Garcia-Alfaro, J., Navarro-Arribas, G., Hartenstein, H., & Herrera-Joancomartí, J. (2017). Data Privacy Management, Cryptocurrencies and Blockchain Technology. Proceedings. https://doi.org/10.1007/978-3-319-67816-0
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.