Evil twins: Handling repetitions in attack–Defense trees: A survival guide

11Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Attack–defense trees are a simple but potent and efficient way to represent and evaluate security scenarios involving a malicious attacker and a defender – their adversary. The nodes of attack–defense trees are labeled with goals of the two actors, and actions that they need to execute to achieve these goals. The objective of this paper is to provide formal guidelines on how to deal with attack–defense trees where several nodes have the same label. After discussing typical issues related to such trees, we define the notion of well-formed attack–defense trees and adapt existing semantics to correctly capture the presence of repeated labels.

Cite

CITATION STYLE

APA

Bossuat, A., & Kordy, B. (2018). Evil twins: Handling repetitions in attack–Defense trees: A survival guide. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10744 LNCS, pp. 17–37). Springer Verlag. https://doi.org/10.1007/978-3-319-74860-3_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free