Securing automated teller machines (ATMs), as critical and complex infrastructure, requires a precise understanding of the associated threats. This paper reports on the application of attack-defense trees to model and analyze the security of ATMs.We capture the most dangerous multi-stage attack scenarios applicable to ATM structures, and establish a practical experience report, where we re ect on the process of modeling ATM threats via attack-defense trees. In particular, we share our insights into the benets and drawbacks of attack-defense tree modeling, as well as best practices and lessons learned.
|Name||Lecture Notes in Business Information Processing|
|Conference||9th IFIP WG 8.1. Working Conference on the Practice of Enterprise Modeling, PoEM 2015|
|Period||8/11/16 → 10/11/16|
|Other||8-10 November 2016|
- EC Grant Agreement nr.: FP7/2007-2013
- EC Grant Agreement nr.: FP7/318003