Automatic Verification of Cryptographic Protocols through Compositional Analysis Techniques
TACAS '99 Proceedings of the 5th International Conference on Tools and Algorithms for Construction and Analysis of Systems
Automated Generation and Analysis of Attack Graphs
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols
Theoretical Computer Science
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
Computer Communications
Formal analysis of security metrics and risk
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Model-based Security Metrics Using ADversary VIew Security Evaluation (ADVISE)
QEST '11 Proceedings of the 2011 Eighth International Conference on Quantitative Evaluation of SysTems
SITIS '11 Proceedings of the 2011 Seventh International Conference on Signal Image Technology & Internet-Based Systems
On the security of public key protocols
IEEE Transactions on Information Theory
Hi-index | 0.00 |
We describe our model for the behaviour of an attacker. In the model, the attacker has uncertain knowledge about a computer system. Moreover, the attacker tries different attack paths if initially selected ones cannot be completed. The model allows finer-grained analysis of the security of computer systems. The model is based on Markov Decision Processes theory for predicting possible attacker's decisions.