Nov. 23, 2023, 2:19 a.m. | Olga Gadyatskaya, Sjouke Mauw, Rolando Trujillo-Rasuac, Tim A. C.Willemse

cs.CR updates on arXiv.org arxiv.org

The problem this article addresses is, given a formal specification of a
system, how to produce an attack tree that correctly and clearly describes the
ways the system can be attacked. Correctness means that the attacks displayed
by the attack tree are indeed attacks in the system; clarity means that the
tree is efficient in communicating the attack scenario. To pursue clarity, we
introduce an attack-tree generation algorithm that minimises the tree size and
the information length of its labels …

addresses article attack attacks automated correctness indeed problem system trees

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Information Security Specialist, Sr. (Container Hardening)

@ Rackner | San Antonio, TX

Principal Security Researcher (Advanced Threat Prevention)

@ Palo Alto Networks | Santa Clara, CA, United States

EWT Infosec | IAM Technical Security Consultant - Manager

@ KPMG India | Bengaluru, Karnataka, India

Security Engineering Operations Manager

@ Gusto | San Francisco, CA; Denver, CO; Remote

Network Threat Detection Engineer

@ Meta | Denver, CO | Reston, VA | Menlo Park, CA | Washington, DC