Using Attack Graphs to Design Systems

  • Authors:
  • Suvajit Gupta;Joel Winstead

  • Affiliations:
  • Cigital;Cigital

  • Venue:
  • IEEE Security and Privacy
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

On a recent project, the authors found informal attack graphs were helpful in the iterative design of a system used to protect sensitive data at a customer site. In this article, they use a snippet from the project's design to illustrate the value of using attack graphs in a secure software development life cycle.