A Proof Calculus for Attack Trees in Isabelle

被引:5
|
作者
Kammueller, Florian [1 ,2 ]
机构
[1] Middlesex Univ London, London, England
[2] Tech Univ Berlin, Berlin, Germany
基金
英国工程与自然科学研究理事会;
关键词
INSIDER THREATS;
D O I
10.1007/978-3-319-67816-0_1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attack trees are an important modeling formalism to identify and quantify attacks on security and privacy. They are very useful as a tool to understand step by step the ways through a system graph that lead to the violation of security policies. In this paper, we present how attacks can be refined based on the violation of a policy. To that end we provide a formal definition of attack trees in Isabelle's Higher Order Logic: a proof calculus that defines how to refine sequences of attack steps into a valid attack. We use a notion of Kripke semantics as formal foundation that then allows to express attack goals using branching time temporal logic CTL. We illustrate the use of the mechanized Isabelle framework on the example of a privacy attack to an IoT healthcare system.
引用
收藏
页码:3 / 18
页数:16
相关论文
共 50 条
  • [21] A Formalization and Proof Checker for Isabelle’s Metalogic
    Simon Roßkopf
    Tobias Nipkow
    Journal of Automated Reasoning, 2023, 67
  • [22] Faster Smarter Proof by Induction in Isabelle/HOL
    Nagashima, Yutaka
    PROCEEDINGS OF THE THIRTIETH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, IJCAI 2021, 2021, : 1981 - 1988
  • [23] Isabelle's Metalogic: Formalization and Proof Checker
    Nipkow, Tobias
    Rosskopf, Simon
    AUTOMATED DEDUCTION, CADE 28, 2021, 12699 : 93 - 110
  • [24] Interpretation of locales in Isabelle: Theories and proof contexts
    Ballarin, Clemens
    MATHEMATICAL KNOWLEDGE MANAGEMENT, PROCEEDINGS, 2006, 4108 : 31 - 43
  • [25] DNSsec in Isabelle - Replay Attack and Origin Authentication
    Kammueller, Florian
    Kirsal-Ever, Yoney
    Cheng, Xiaochun
    2013 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2013), 2013, : 4772 - 4777
  • [26] Assessing Security of Cryptocurrencies with Attack-Defense Trees: Proof of Concept and Future Directions
    Eisentraut, Julia
    Holzer, Stephan
    Klioba, Katharina
    Kretinsky, Jan
    Pin, Lukas
    Wagner, Alexander
    THEORETICAL ASPECTS OF COMPUTING, ICTAC 2021, 2021, 12819 : 214 - 234
  • [27] INTRODUCING A CALCULUS OF TREES
    KASANGIAN, S
    VIGNA, S
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 493 : 215 - 240
  • [28] Attack trees
    Schneier, B
    DR DOBBS JOURNAL, 1999, 24 (12): : 21 - +
  • [29] Simple Dataset for Proof Method Recommendation in Isabelle/HOL
    Nagashima, Yutaka
    INTELLIGENT COMPUTER MATHEMATICS, CICM 2020, 2020, 12236 : 297 - 302
  • [30] PaMpeR: Proof Method Recommendation System for Isabelle/HOL
    Nagashima, Yutaka
    He, Yilun
    PROCEEDINGS OF THE 2018 33RD IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMTED SOFTWARE ENGINEERING (ASE' 18), 2018, : 362 - 372