2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security) 2020
DOI: 10.1109/cybersecurity49315.2020.9138852
|View full text |Cite
|
Sign up to set email alerts
|

Automated Vulnerability Testing via Executable Attack Graphs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…[25], [38] [39], [53], [55], [71] 5) What methods and tools are used for visualizing the model, framework, or application? [6], [16], [27], [30], [37], [39], [40], [62] 6) What properties of the model, framework, or application can be analyzed? [14], [32], [35], [67] 7) What recommendations can be obtained from the attack graph to secure the IoT network?…”
Section: E Research Questionsmentioning
confidence: 99%
See 1 more Smart Citation
“…[25], [38] [39], [53], [55], [71] 5) What methods and tools are used for visualizing the model, framework, or application? [6], [16], [27], [30], [37], [39], [40], [62] 6) What properties of the model, framework, or application can be analyzed? [14], [32], [35], [67] 7) What recommendations can be obtained from the attack graph to secure the IoT network?…”
Section: E Research Questionsmentioning
confidence: 99%
“…However, no thorough study has addressed IoT vulnerabilities and their evaluation using attack graphs. Although some papers capture both attack graphs and IoT [3], [34], they either do not cover certain topics, such as the parameters of the IoT network used to develop the attack graph [8], [17], [35], [48], [52], [54], [57], [68], [69] and the methods and tools used for visualizing the model, framework, or application [6], [16], [27], [30], [37], [39], [40], [62], or are no longer fully relevant due to the rapidly evolving domain. This survey paper is needed because IoT systems are becoming increasingly complex and pervasive in our daily lives, making it crucial to ensure their security.…”
Section: Introductionmentioning
confidence: 99%
“…Attackers may have arbitrary goals represented as assets [31]. LAGs may also support the various levels of attacker capabilities if they are defined as preconditions for exploits [50], [51]. However, due to the common delete-free relaxation in LAG solvers, modeling attacker resources may be challenging.…”
Section: Mulval Extensions a The Mulval Frameworkmentioning
confidence: 99%
“…Another possible way to reduce experimental costs and cybersecurity costs more generally is the use of automated red teaming algorithms that might serve as a proxy for human red teams. Work is on-going in this space (e.g., [50] [51]) and the results may eventually become suitable for mimicking lower tier threats.…”
Section: Table 6: Net Loss Reduction / Benefitmentioning
confidence: 99%