Abstract
Since software plays an ever more important role in measuring instruments, risk assessments for such instruments required by European regulations will usually include also a risk assessment of the software. Although previously introduced methods still lack efficient means for the representation of attacker motivation and have no prescribed way of constructing attack scenarios, attack trees have been used for several years in similar application scenarios. These trees are here developed into attack probability trees, specifically tailored to meet the requirements for software risk assessment. A real-world example based on taximeters is given to illustrate the application of attack probability trees approach and their advantages.
Cite
CITATION STYLE
Esche, M., Toro, F. G., & Thiel, F. (2017). Representation of attacker motivation in software risk assessment using attack probability trees. In Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, FedCSIS 2017 (pp. 763–771). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.15439/2017F112
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.