Representation of attacker motivation in software risk assessment using attack probability trees

11Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.

Abstract

Since software plays an ever more important role in measuring instruments, risk assessments for such instruments required by European regulations will usually include also a risk assessment of the software. Although previously introduced methods still lack efficient means for the representation of attacker motivation and have no prescribed way of constructing attack scenarios, attack trees have been used for several years in similar application scenarios. These trees are here developed into attack probability trees, specifically tailored to meet the requirements for software risk assessment. A real-world example based on taximeters is given to illustrate the application of attack probability trees approach and their advantages.

Cite

CITATION STYLE

APA

Esche, M., Toro, F. G., & Thiel, F. (2017). Representation of attacker motivation in software risk assessment using attack probability trees. In Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, FedCSIS 2017 (pp. 763–771). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.15439/2017F112

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free