Abstract
Existing methods for security risk analysis typically estimate time, cost, or likelihood of success of attack steps. When the threat environment changes, such values have to be updated as well. However, the estimated values reflect both system properties and attacker properties: the time required for an attack step depends on attacker skill as well as the strength of a particular system component. In the TRESPASS project, we propose the separation of attacker and system properties. By doing so, we enable “plug-and-play‿ attacker profiles: profiles of adversaries that are independent of system properties, and thus can be re- used in the same or different organisation to compare risk in case of different attacker profiles. We demonstrate its application in the framework of attack trees, as well as our new concept of attack navigators.
Original language | English |
---|---|
Title of host publication | 35th IEEE Symposium on Security and Privacy |
Place of Publication | Piscataway, New Jersey |
Publisher | IEEE |
Number of pages | 2 |
Publication status | Published - May 2014 |
Event | 35th IEEE Symposium on Security and Privacy 2014 - The Fairmont, San Jose, United States Duration: 18 May 2014 → 21 May 2014 Conference number: 35 http://www.ieee-security.org/TC/SP2014/ |
Conference
Conference | 35th IEEE Symposium on Security and Privacy 2014 |
---|---|
Country/Territory | United States |
City | San Jose |
Period | 18/05/14 → 21/05/14 |
Internet address |
Keywords
- EC Grant Agreement nr.: FP7/2007-2013
- EC Grant Agreement nr.: FP7/318003