Attack trees with sequential conjunction

Ravi Jhawar, Barbara Kordy, Sjouke Mauw, Saša Radomirović, Rolando Trujillo-Rasua

Research output: Chapter in Book/Report/Conference proceedingConference contribution

42 Citations (Scopus)

Abstract

We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND attack tree formalism increases the expressivity of attack trees by introducing the sequential conjunctive operator SAND. This operator enables the modeling of ordered events. We give a semantics to SAND attack trees by interpreting them as sets of series-parallel graphs and propose a complete axiomatization of this semantics. We define normal forms for SAND attack trees and a term rewriting system which allows identification of semantically equivalent trees. Finally, we formalize how to quantitatively analyze SAND attack trees using attributes.

Original languageEnglish
Title of host publicationICT Systems Security and Privacy Protection
Subtitle of host publicationSEC 2015
EditorsHannes Federrath, Dieter Gollmann
PublisherSpringer
Pages339-353
Number of pages15
ISBN (Electronic)9783319184678
ISBN (Print)9783319184661
DOIs
Publication statusPublished - 2015
Event30th IFIP TC 11 International Information Security and Privacy Conference 2015 - Hamburg, Germany
Duration: 26 May 201528 May 2015

Publication series

NameIFIP Advances in Information and Communication Technology
Volume455
ISSN (Print)1868-4238

Conference

Conference30th IFIP TC 11 International Information Security and Privacy Conference 2015
Abbreviated titleSEC 2015
CountryGermany
CityHamburg
Period26/05/1528/05/15

Keywords

  • Attack trees
  • SAND
  • Security modeling
  • Sequential operators

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications
  • Information Systems and Management

Fingerprint Dive into the research topics of 'Attack trees with sequential conjunction'. Together they form a unique fingerprint.

  • Cite this

    Jhawar, R., Kordy, B., Mauw, S., Radomirović, S., & Trujillo-Rasua, R. (2015). Attack trees with sequential conjunction. In H. Federrath, & D. Gollmann (Eds.), ICT Systems Security and Privacy Protection: SEC 2015 (pp. 339-353). (IFIP Advances in Information and Communication Technology; Vol. 455). Springer. https://doi.org/10.1007/978-3-319-18467-8_23