2019
DOI: 10.1007/978-3-030-30985-5_18
|View full text |Cite
|
Sign up to set email alerts
|

A Decade of Featured Transition Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 79 publications
0
12
0
Order By: Relevance
“…It would be worthwhile to investigate the introduction of nondeterminism aspects typical of Markov decision processes. The non-deterministic transitions could be labeled with Boolean formulae, similar to the feature expressions that label the transitions of featured transition systems [14,15]. This would allows us to consider different kind of problems such as that of synthesizing the best attacker or to formulate statements like "all attackers with feature A satisfy a given property".…”
Section: Vision and Roadmapmentioning
confidence: 99%
See 1 more Smart Citation
“…It would be worthwhile to investigate the introduction of nondeterminism aspects typical of Markov decision processes. The non-deterministic transitions could be labeled with Boolean formulae, similar to the feature expressions that label the transitions of featured transition systems [14,15]. This would allows us to consider different kind of problems such as that of synthesizing the best attacker or to formulate statements like "all attackers with feature A satisfy a given property".…”
Section: Vision and Roadmapmentioning
confidence: 99%
“…This is problematic as attack scenarios must be evaluated on concrete systems, which are reacting in a dynamic defense manner to successive and ordered attack steps. In order to mitigate this problem, we combine attack trees with a behavioral model, just like feature diagrams have been combined with featured transition systems [14,15]. More precisely, the graphical security model for quantitative security modeling we propose here is based on declarative attributed attack-defense trees [21,22] to model the structure and properties (in the form of attributes) of vulnerabilities, defenses and countermeasures on the one hand, and on procedural probabilistic models [1,4,13,26,31] to capture attack behavior, modeling resource constraints and attack effectiveness, on the other hand.…”
Section: Introductionmentioning
confidence: 99%
“…A Featured Transition System (FTS) is a formal model with variability for capturing the behaviour of all products of an SPL in one compact model (Classen et al 2013;Cordy et al 2019); its action-labelled transitions are associated with features that condition their presence in product behaviour. Proving correctness of such models through model checking or testing is challenging.…”
Section: Introductionmentioning
confidence: 99%
“…Authors reserve their rights to disseminate the work on their personal and corporate Web sites with the appropriate attribution. https://doi.org/10.5281/zenodo.4497888 transition system [26,29]; its transitions, labelled with actions, are associated with features that condition their presence in classical Labelled Transition Systems (LTSs) that model individual variant behaviour. Proving correctness of such behavioural models through model checking or testing is challenging.…”
Section: Introductionmentioning
confidence: 99%