2018 IEEE European Symposium on Security and Privacy (EuroS&P) 2018
DOI: 10.1109/eurosp.2018.00014
|View full text |Cite
|
Sign up to set email alerts
|

Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
26
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(26 citation statements)
references
References 31 publications
0
26
0
Order By: Relevance
“…A weak point of this methodology was the lack of justification for their attacker model. Symbolic soundness and completeness can bridge this gap, as we will demonstrate for a subset of the email model [52]. As we argued in Section III, to justify the correctness of the Stackelberg planning problem, it is sufficient to show the symbolic soundness/correctness for the attacker planning problem, but for arbitrary initial states.…”
Section: Applicationsmentioning
confidence: 86%
See 3 more Smart Citations
“…A weak point of this methodology was the lack of justification for their attacker model. Symbolic soundness and completeness can bridge this gap, as we will demonstrate for a subset of the email model [52]. As we argued in Section III, to justify the correctness of the Stackelberg planning problem, it is sufficient to show the symbolic soundness/correctness for the attacker planning problem, but for arbitrary initial states.…”
Section: Applicationsmentioning
confidence: 86%
“…1: Relation between different levels of abstraction JavaScript. More recently, Speicher et al [52] introduced the first deployment analysis on a global level, evaluating various measures to secure the email infrastructure against large-scale attacks. They employ Stackelberg planning [53], which is a twostage planning technique that computes all defender plans that are Pareto-optimal with respect to their cost and the worst-case impact of an attacker.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…MulVAL [35], [34] was the first attack graph tool providing automatic end-to-end attack graph generation and analysis. Specifically, MulVAL can be used to derive the attack surface and quantify the risk of the system; based on the attack surface generated, various methods can be applied in order to automatically find the optimal mitigation strategy [43], [41], [42], [22], [21], [13].…”
Section: Introductionmentioning
confidence: 99%