Algorithmic analysis of programs with well quasi-ordered domains
Information and Computation - Special issue: LICS 1996—Part 1
Automated Generation and Analysis of Attack Graphs
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Wireless and Cellular Networks
Wireless and Cellular Networks
Elaborating Security Requirements by Construction of Intentional Anti-Models
Proceedings of the 26th International Conference on Software Engineering
Defense trees for economic evaluation of security investments
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Analyzing Security Scenarios Using Defence Trees and Answer Set Programming
Electronic Notes in Theoretical Computer Science (ENTCS)
Strategic games on defense trees
FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Attribute Decoration of Attack-Defense Trees
International Journal of Secure Software Engineering
Quantitative questions on attack: defense trees
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Hi-index | 0.00 |
In this paper we introduce the concept of attack jungles, which is a formalism for systematic representation of the vulnerabilities of systems. An attack jungle is a graph representation of all ways in which an attacker successfully can achieve his goal. Attack jungles are an extension of attack trees [13] that allows multiple roots, cycles and reusability of resources. We have implemented a prototype tool for constructing and analyzing attack jungles. The tool was used to analyze the security of the GSM (radio) access network.