DOI: 10.1007/978-0-387-09699-5_35
|View full text |Cite
|
Sign up to set email alerts
|

ASTRA : A Security Analysis Method Based on Asset Tracking

Abstract: ASTRA is a security analysis method based on the systematic collection and analysis of security relevant information to detect inconsistencies and assess residual risks. ASTRA can accommodate organizational as well as technical aspects of security and it can be applied to innovative products for which no security data (e.g. vulnerability or attack database) is available. In addition, ASTRA explicitly deals with the notion of responsibility and naturally leads to an iterative refinement approach. This paper pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…One of the main challenges in this area is thus to reconcile the global, encompassing view and the local view. A first attempt to achieve this reconciliation is described in [8] which proposes a semi-formal framework to detect and analyse the vulnerabilities of a product based on different security views. These views make it possible to track the assets in their different locations and identify the responsibilities of the actors involved.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…One of the main challenges in this area is thus to reconcile the global, encompassing view and the local view. A first attempt to achieve this reconciliation is described in [8] which proposes a semi-formal framework to detect and analyse the vulnerabilities of a product based on different security views. These views make it possible to track the assets in their different locations and identify the responsibilities of the actors involved.…”
Section: Resultsmentioning
confidence: 99%
“…Preconditions define properties of the environment or configurations of the system which make an attack possible; postconditions characterize the modifications of the state of the system resulting from the attack (or attack step). The main benefit of the approach is to provide a setting for the systematic study of the composition of individual threats (or attack steps) to build larger attacks 8 . It thus contributes to reducing the likelihood of oversights in the consideration of potential attacks based on individual threats.…”
Section: Formal Approaches Based On Attack Treesmentioning
confidence: 99%
See 1 more Smart Citation