We discuss in this paper the use of SysML-Sec attack graphs as a graphical and semi-formal representation for complex attacks. We illustrate this on a PC and mobile malware example. We furthermore pro-vide examples of the expressivity of the operators used in such diagrams. We finally formalize the attack traces described by these operators based on timed automata.
CITATION STYLE
Jonkers, H., & Quartel, D. (2016). Graphical Models for Security. Third International Workshop, GraMSec 2016 (Vol. 9987, pp. 94–101). Retrieved from http://link.springer.com/10.1007/978-3-319-46263-9
Mendeley helps you to discover research relevant for your work.