@inproceedings{9e88265a01c84b5b927267c4fb3655ce,
title = "Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees",
abstract = "Security risk treatment often requires a complex cost-benefit analysis to be carried out in order to select countermeasures that optimally reduce risks while having minimal costs. According to ISO/IEC 27001, risk treatment relies on catalogues of countermeasures, and the analysts are expected to estimate the residual risks. At the same time, recent advancements in attack tree theory provide elegant solutions to this optimization problem. In this paper we propose to bridge the gap between these two worlds by introducing optimal countermeasure selection problem on attack-defense trees into the TRICK security risk assessment methodology.",
keywords = "EC Grant Agreement nr.: FP7/318003, EC Grant Agreement nr.: FP7/2007–2013, IR-101549, METIS-318530, EWI-27242",
author = "Olga Gadyatskaya and Carlo Harpes and Sjouke Mauw and Cedric Muller and Steve Muller",
note = "eemcs-eprint-27242 ; 3rd International Workshop on Graphical Models for Security, GraMSec 2016, GraMSec ; Conference date: 27-06-2016 Through 27-06-2016",
year = "2016",
month = sep,
day = "8",
doi = "10.1007/978-3-319-46263-9_5",
language = "English",
isbn = "978-3-319-46262-2",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "80--93",
editor = "Barbara Kordy and Mathias Ekstedt and Kim, {Dong Seong}",
booktitle = "Graphical Models for Security",
}