, /* initial attack location and final attack status */ attackerLocated(internet)

, attackGoal(execCode(database,user))

, /* configuration information of webServer */ vulExists(webServer,'directAccess',httpd). vulProperty('directAccess',remoteExploit,privEscalation)

, CWE-89',httpd). vulProperty('CWE-89',remoteExploit,privEscalation), /* vulnerability of the web application */ vulExists(database

L. Herbert, Specification, Verification and Optimization of Business Processes: A Unified Framework, 2014.

S. Jajodia and S. Noel, Topological vulnerability analysis, pp.139-154, 2010.

C. Liu, A. Singhal, and D. Wijesekera, Mapping evidence graphs to attack graphs, Proceedings of the IEEE International Workshop on Information Forensics and Security, pp.121-126, 2012.

C. Liu, A. Singhal, and D. Wijesekera, A logic-based network forensic model for evidence analysis, Advances in Digital Forensics XI, pp.129-145, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01449074

C. Liu, A. Singhal, and D. Wijesekara, A probabilistic network forensic model for evidence analysis, Advances in Digital Forensics XII, pp.189-210, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01758685

P. Mell and T. Grance, NIST Special Publication, pp.800-145, 2011.

S. Musman and A. Temin, A cyber mission impact assessment tool, Proceedings of the IEEE International Symposium on Technologies for Homeland Security, 2015.

S. Noel, J. Ludwig, P. Jain, D. Johnson, R. Thomas et al., Analyzing mission impacts of cyber actions (AMICA), Proceedings of the NATO IST-128 Workshop: Assessing Mission Impact of Cyberattacks, pp.80-86, 2015.

, OpenStack Foundation, Software, Austin, Texas (www.openstack. org/software), 2018.

X. Ou, S. Govindavajhala, and A. Appel, MulVAL: A logic-based network security analyzer, Proceedings of the Fourteenth USENIX Security Symposium, 2005.

K. Ruan, J. Carthy, T. Kechadi, M. Crosbie, and C. Forensics, Advances in Digital, pp.35-46, 2011.

M. Saudi, An Overview of a Disk Imaging Tool in Computer Forensics, 2001.

X. Sun, J. Dai, P. Liu, A. Singhal, and J. Yen, Towards probabilistic identification of zero-day attack paths, Proceedings of the IEEE Conference on Communications and Network Security, pp.64-72, 2016.

X. Sun, A. Singhal, and P. Liu, Towards actionable mission impact assessment in the context of cloud computing, pp.259-274, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01684363

Y. Sun, T. Wu, X. Liu, and M. Obaidat, Multilayered impact evaluation model for attacking missions, IEEE Systems Journal, vol.10, issue.4, pp.1304-1315, 2016.

W. Wang and T. Daniels, A graph based approach toward network forensic analysis, ACM Transactions on Information and Systems Security, vol.12, issue.1, 2008.

Y. Yarom and K. Falkner, FLUSH+RELOAD: A high resolution, low noise, L3 cache side-channel attack, Proceedings of the TwentyThird USENIX Security Symposium, pp.719-732, 2014.

Y. Zhang, A. Juels, M. Reiter, and T. Ristenpart, Cross-VM side channels and their use to extract private keys, Proceedings of the ACM Conference on Computer and Communications Security, pp.305-316, 2012.