Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

Olga Gadyatskaya, Ravi Jhawar, P.T. Kordy, Karim Lounis, Sjouke Mauw, Rolando Trujillo-Rasua

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    29 Citations (Scopus)

    Abstract

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with sequential conjunctive refinement.
    Original languageEnglish
    Title of host publication13th International Conference on Quantitative Evaluation of Systems, QEST 2016
    Place of PublicationSwitzerland
    PublisherSpringer
    Pages159-162
    Number of pages4
    ISBN (Print)9783319434247
    DOIs
    Publication statusPublished - 3 Aug 2016
    Event13th International Conference on Quantitative Evaluation of SysTems, QEST 2016 - Hôtel Château Laurier, Quebec City, Canada
    Duration: 23 Aug 201625 Aug 2016
    Conference number: 13
    http://www.qest.org/qest2016/

    Publication series

    NameLecture Notes in Computer Science
    PublisherSpringer International Publishing
    Volume9826
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Conference

    Conference13th International Conference on Quantitative Evaluation of SysTems, QEST 2016
    Abbreviated titleQEST
    CountryCanada
    CityQuebec City
    Period23/08/1625/08/16
    Internet address

    Keywords

    • EC Grant Agreement nr.: FP7/318003
    • EC Grant Agreement nr.: FP7/2007-2013
    • IR-101599
    • METIS-318541
    • EWI-27273

    Fingerprint Dive into the research topics of 'Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0'. Together they form a unique fingerprint.

    Cite this