Automated generation of attack trees

被引:0
|
作者
Vigo, Roberto [1 ]
Nielson, Flemming [1 ]
Nielson, Hanne Riis [1 ]
机构
[1] Department of Applied Mathematics and Computer Science, Technical University of Denmark, Denmark
关键词
Algebraic specifications - Analysis approach - Attack tree - Authentication systems - Automated generation - Exponential explosion - [!text type='Java']Java[!/text] implementation - Satisfiability modulo Theories;
D O I
6957121
中图分类号
学科分类号
摘要
引用
收藏
页码:337 / 350
相关论文
共 50 条
  • [11] A Methodology for Systematic Attack Trees Generation for Interoperable Medical Devices
    Xu, J.
    Venkatasubramanian, K. K.
    Sfyrla, Vasiliki
    2016 ANNUAL IEEE SYSTEMS CONFERENCE (SYSCON), 2016, : 777 - 783
  • [12] Attack trees
    Schneier, B
    DR DOBBS JOURNAL, 1999, 24 (12): : 21 - +
  • [13] Towards Automated Generation and Visualization of Hierarchical Attack Representation Models
    Jia, Fangcheng
    Hong, Jin B.
    Kim, Dong Seong
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1690 - 1697
  • [14] Execution Trace-Driven Automated Attack Signature Generation
    Nanda, Susanta
    Chiueh, Tzi-cker
    24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 195 - 204
  • [15] GUI-Squatting Attack: Automated Generation of Android Phishing Apps
    Chen, Sen
    Fan, Lingling
    Chen, Chunyang
    Xue, Minhui
    Liu, Yang
    Xu, Lihua
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2551 - 2568
  • [16] Unleashing offensive artificial intelligence: Automated attack technique code generation
    Iturbe, Eider
    Llorente-Vazquez, Oscar
    Rego, Angel
    Rios, Erkuden
    Toledo, Nerea
    COMPUTERS & SECURITY, 2024, 147
  • [17] Automated cyber-attack scenario generation using the symbolic simulation
    Lee, JK
    Lee, MW
    Lee, JS
    Chi, SD
    Ohn, SY
    ARTIFICIAL INTELLIGENCE AND SIMULATION, 2004, 3397 : 380 - 389
  • [18] ACCURIFY: Automated New Testflows Generation for Attack Variants in Threat Hunting
    Nour, Boubakr
    Pourzandi, Makan
    Qureshi, Rushaan Kamran
    Debbabi, Mourad
    FOUNDATIONS AND PRACTICE OF SECURITY, PT II, FPS 2023, 2024, 14552 : 52 - 69
  • [19] Attribution of attack trees
    Whitley, John N.
    Phan, Raphael C-W
    Wang, Jie
    Parish, David J.
    COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (04) : 624 - 628
  • [20] Foundations of attack trees
    Mauw, Sjouke
    Oostdijk, Martijn
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2005, 2006, 3935 : 186 - 198