Abstract
Securing automated teller machines (ATMs), as critical and complex infrastructure, requires a precise understanding of the associated threats. This paper reports on the application of attack-defense trees to model and analyze the security of ATMs.We capture the most dangerous multi-stage attack scenarios applicable to ATM structures, and establish a practical experience report, where we re ect on the process of modeling ATM threats via attack-defense trees. In particular, we share our insights into the benets and drawbacks of attack-defense tree modeling, as well as best practices and lessons learned.
| Original language | Undefined |
|---|---|
| Title of host publication | 9th IFIP WG 8.1 Working Conference on The Practice of Enterprise Modeling (PoEM) |
| Place of Publication | Berlin |
| Publisher | Springer |
| Pages | 326-334 |
| Number of pages | 9 |
| ISBN (Print) | 978-3-319-48392-4 |
| DOIs | |
| Publication status | Published - 2016 |
| Event | 9th IFIP WG 8.1. Working Conference on the Practice of Enterprise Modeling, PoEM 2015 - Skovde, Sweden Duration: 8 Nov 2016 → 10 Nov 2016 Conference number: 9 |
Publication series
| Name | Lecture Notes in Business Information Processing |
|---|---|
| Publisher | Springer |
| Volume | 267 |
| ISSN (Print) | 1865-1348 |
Conference
| Conference | 9th IFIP WG 8.1. Working Conference on the Practice of Enterprise Modeling, PoEM 2015 |
|---|---|
| Abbreviated title | PoEM 2016 |
| Country/Territory | Sweden |
| City | Skovde |
| Period | 8/11/16 → 10/11/16 |
Keywords
- EWI-27289
- EC Grant Agreement nr.: FP7/2007-2013
- IR-101626
- METIS-318548
- EC Grant Agreement nr.: FP7/318003
Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver