all InfoSec news
Automated generation of attack trees with optimal shape and labelling. (arXiv:2311.13331v1 [cs.CR])
Nov. 23, 2023, 2:19 a.m. | Olga Gadyatskaya, Sjouke Mauw, Rolando Trujillo-Rasuac, Tim A. C.Willemse
cs.CR updates on arXiv.org arxiv.org
The problem this article addresses is, given a formal specification of a
system, how to produce an attack tree that correctly and clearly describes the
ways the system can be attacked. Correctness means that the attacks displayed
by the attack tree are indeed attacks in the system; clarity means that the
tree is efficient in communicating the attack scenario. To pursue clarity, we
introduce an attack-tree generation algorithm that minimises the tree size and
the information length of its labels …
addresses article attack attacks automated correctness indeed problem system trees
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Social Engineer For Reverse Engineering Exploit Study
@ Independent study | Remote
Information Security Specialist, Sr. (Container Hardening)
@ Rackner | San Antonio, TX
Principal Security Researcher (Advanced Threat Prevention)
@ Palo Alto Networks | Santa Clara, CA, United States
EWT Infosec | IAM Technical Security Consultant - Manager
@ KPMG India | Bengaluru, Karnataka, India
Security Engineering Operations Manager
@ Gusto | San Francisco, CA; Denver, CO; Remote
Network Threat Detection Engineer
@ Meta | Denver, CO | Reston, VA | Menlo Park, CA | Washington, DC