Abstract
Securing automated teller machines (ATMs), as critical and complex infrastructure, requires a precise understanding of the associated threats. This paper reports on the application of attack-defense trees to model and analyze the security of ATMs.We capture the most dangerous multi-stage attack scenarios applicable to ATM structures, and establish a practical experience report, where we re ect on the process of modeling ATM threats via attack-defense trees. In particular, we share our insights into the benets and drawbacks of attack-defense tree modeling, as well as best practices and lessons learned.
Original language | Undefined |
---|---|
Title of host publication | 9th IFIP WG 8.1 Working Conference on The Practice of Enterprise Modeling (PoEM) |
Place of Publication | Berlin |
Publisher | Springer |
Pages | 326-334 |
Number of pages | 9 |
ISBN (Print) | 978-3-319-48392-4 |
DOIs | |
Publication status | Published - 2016 |
Event | 9th IFIP WG 8.1. Working Conference on the Practice of Enterprise Modeling, PoEM 2015 - Skovde, Sweden Duration: 8 Nov 2016 → 10 Nov 2016 Conference number: 9 |
Publication series
Name | Lecture Notes in Business Information Processing |
---|---|
Publisher | Springer |
Volume | 267 |
ISSN (Print) | 1865-1348 |
Conference
Conference | 9th IFIP WG 8.1. Working Conference on the Practice of Enterprise Modeling, PoEM 2015 |
---|---|
Abbreviated title | PoEM 2016 |
Country/Territory | Sweden |
City | Skovde |
Period | 8/11/16 → 10/11/16 |
Keywords
- EWI-27289
- EC Grant Agreement nr.: FP7/2007-2013
- IR-101626
- METIS-318548
- EC Grant Agreement nr.: FP7/318003