Foundations of Attack–Defense Trees

Barbara Kordy, Sjouke Mauw, Saša Radomirović, Patrick Schweitzer

Research output: Chapter in Book/Report/Conference proceedingConference contribution

99 Citations (Scopus)

Abstract

We introduce and give formal definitions of attack-defense trees. We argue that these trees are a simple, yet powerful tool to analyze complex security and privacy problems. Our formalization is generic in the sense that it supports different semantical approaches. We present several semantics for attack-defense trees along with usage scenarios, and we show how to evaluate attributes.

Original languageEnglish
Title of host publicationFormal Aspects of Security and Trust
Subtitle of host publication7th International Workshop, FAST 2010, Revised Selected Papers
EditorsPierpaolo Degano, Sandro Etalle, Joshua Guttman
Place of PublicationBerlin
PublisherSpringer Verlag
Pages80-95
Number of pages16
ISBN (Electronic)9783642197512
ISBN (Print)9783642197505
DOIs
Publication statusPublished - 2011
Event7th International Workshop on Formal Aspects of Security and Trust - Auditorium of the CNR Research Area, Pisa, Italy
Duration: 16 Sep 201017 Sep 2010
http://www.iit.cnr.it/FAST2010/ (Link to Workshop website)

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume6561
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Workshop

Workshop7th International Workshop on Formal Aspects of Security and Trust
Abbreviated titleFAST 2010
CountryItaly
CityPisa
Period16/09/1017/09/10
OtherWorkshop is co-located with The 8th IEEE International Conference on Software Engineering and Formal Methods (SEFM2010)
Internet address

Fingerprint Dive into the research topics of 'Foundations of Attack–Defense Trees'. Together they form a unique fingerprint.

  • Cite this

    Kordy, B., Mauw, S., Radomirović, S., & Schweitzer, P. (2011). Foundations of Attack–Defense Trees. In P. Degano, S. Etalle, & J. Guttman (Eds.), Formal Aspects of Security and Trust : 7th International Workshop, FAST 2010, Revised Selected Papers (pp. 80-95). (Lecture Notes in Computer Science ; Vol. 6561). Springer Verlag. https://doi.org/10.1007/978-3-642-19751-2_6