Skip to Main content Skip to Navigation
Conference papers

Attack Tree Generation by Policy Invalidation

Abstract : Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps.
Document type :
Conference papers
Complete list of metadata

https://hal.inria.fr/hal-01442547
Contributor : Hal Ifip <>
Submitted on : Friday, January 20, 2017 - 4:47:50 PM
Last modification on : Tuesday, April 24, 2018 - 4:16:02 PM
Long-term archiving on: : Friday, April 21, 2017 - 4:15:47 PM

File

978-3-319-24018-3_16_Chapter.p...
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Marieta Ivanova, Christian Probst, René Hansen, Florian Kammüller. Attack Tree Generation by Policy Invalidation. 9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.249-259, ⟨10.1007/978-3-319-24018-3_16⟩. ⟨hal-01442547⟩

Share

Metrics

Record views

226

Files downloads

318