2006
DOI: 10.1007/11734727_17
|View full text |Cite
|
Sign up to set email alerts
|

Foundations of Attack Trees

Abstract: Abstract. Attack trees have found their way to practice because they have proved to be an intuitive aid in threat analysis. Despite, or perhaps thanks to, their apparent simplicity, they have not yet been provided with an unambiguous semantics. We argue that such a formal interpretation is indispensable to precisely understand how attack trees can be manipulated during construction and analysis. We provide a denotational semantics, based on a mapping to attack suites, which abstracts from the internal structur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
376
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 367 publications
(414 citation statements)
references
References 9 publications
1
376
0
Order By: Relevance
“…A threat tree is composed of a single root node that defines the primary threat to an asset (for example, 'Disrupt Web Server' in Figure 1a). A threat may be decomposed into additional fine-grained sub-threats (for example, 'Denial of Service'), thereby forming a tree hierarchy [39]. A threat profile can be described as the path from a leaf node to the root node which represents a specific set of states involved in either achieving the primary threat or countering it.…”
Section: Threat Treesmentioning
confidence: 99%
See 1 more Smart Citation
“…A threat tree is composed of a single root node that defines the primary threat to an asset (for example, 'Disrupt Web Server' in Figure 1a). A threat may be decomposed into additional fine-grained sub-threats (for example, 'Denial of Service'), thereby forming a tree hierarchy [39]. A threat profile can be described as the path from a leaf node to the root node which represents a specific set of states involved in either achieving the primary threat or countering it.…”
Section: Threat Treesmentioning
confidence: 99%
“…Threat Trees [39,61], Attack Trees [56] and similar tree-based threat-modeling methodologies [6,17] are used to help identify, represent and analyse threats to an enterprise's assets. Their topdown approach provides a semi-formal but methodical way to determine viable threat vectors (who, why and how a system can be compromised).…”
Section: Introductionmentioning
confidence: 99%
“…To establish the characteristics that together determine the acceptability, we construct an objective tree of voter influencing in Section 2.2. Objective trees are attack trees (see [19,13]), but focus upon meeting goals instead of achieving attacks.…”
Section: Legal and Illegal Influencingmentioning
confidence: 99%
“…A threat may be decomposed into additional fine-grained sub-threats ('Denial of Service'), thereby forming a tree hierarchy [1]. A threat profile can be described as the path from a leaf node to the root node which represents a specific set of states involved in either achieving the primary threat or countering it.…”
Section: Threat Treesmentioning
confidence: 99%
“…Threat Trees [1,2], Attack Trees [3] and similar tree-based threat-modeling methodologies [4,5] are used to help identify, represent and analyze about threats to an enterprise's assets. Their top-down approach provides a semi-formal and methodical way to determine viable threat vectors (who, why and how a system can be compromised).…”
Section: Introductionmentioning
confidence: 99%