Abstract
Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identication. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identied through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based on invalidating policies in the sys- tem model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps.
Original language | English |
---|---|
Title of host publication | 9th IFIP WG 11.2 International Conference on Information Security Theory and Practice, WISTP 2015 |
Editors | R. Naeem Akram, S. Jajodia |
Place of Publication | Berlin |
Publisher | Springer |
Pages | 249-259 |
Number of pages | 11 |
ISBN (Print) | 9783319240183 |
DOIs | |
Publication status | Published - 24 Aug 2015 |
Event | 9th IFIP WG 11.2 International Conference on Information Security Theory and Practice, WISTP 2015 - Heraklion, Crete, Greece Duration: 24 Aug 2015 → 25 Aug 2015 Conference number: 9 |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer |
Volume | 9311 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 9th IFIP WG 11.2 International Conference on Information Security Theory and Practice, WISTP 2015 |
---|---|
Abbreviated title | WISTP |
Country/Territory | Greece |
City | Heraklion, Crete |
Period | 24/08/15 → 25/08/15 |
Other | 24-25 August 2015 |
Keywords
- Attack Tree Generation
- Policy Invalidation
- EC Grant Agreement nr.: FP7/2007-2013
- EC Grant Agreement nr.: FP7/318003