Attack–defense trees are a simple but potent and efficient way to represent and evaluate security scenarios involving a malicious attacker and a defender – their adversary. The nodes of attack–defense trees are labeled with goals of the two actors, and actions that they need to execute to achieve these goals. The objective of this paper is to provide formal guidelines on how to deal with attack–defense trees where several nodes have the same label. After discussing typical issues related to such trees, we define the notion of well-formed attack–defense trees and adapt existing semantics to correctly capture the presence of repeated labels.
CITATION STYLE
Bossuat, A., & Kordy, B. (2018). Evil twins: Handling repetitions in attack–Defense trees: A survival guide. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10744 LNCS, pp. 17–37). Springer Verlag. https://doi.org/10.1007/978-3-319-74860-3_2
Mendeley helps you to discover research relevant for your work.