A Proof Calculus for Attack Trees in Isabelle

被引:5
|
作者
Kammueller, Florian [1 ,2 ]
机构
[1] Middlesex Univ London, London, England
[2] Tech Univ Berlin, Berlin, Germany
基金
英国工程与自然科学研究理事会;
关键词
INSIDER THREATS;
D O I
10.1007/978-3-319-67816-0_1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attack trees are an important modeling formalism to identify and quantify attacks on security and privacy. They are very useful as a tool to understand step by step the ways through a system graph that lead to the violation of security policies. In this paper, we present how attacks can be refined based on the violation of a policy. To that end we provide a formal definition of attack trees in Isabelle's Higher Order Logic: a proof calculus that defines how to refine sequences of attack steps into a valid attack. We use a notion of Kripke semantics as formal foundation that then allows to express attack goals using branching time temporal logic CTL. We illustrate the use of the mechanized Isabelle framework on the example of a privacy attack to an IoT healthcare system.
引用
收藏
页码:3 / 18
页数:16
相关论文
共 50 条
  • [41] Stochastic calculus and martingales on trees
    Picard, J
    ANNALES DE L INSTITUT HENRI POINCARE-PROBABILITES ET STATISTIQUES, 2005, 41 (04): : 631 - 683
  • [42] A coinductive calculus of binary trees
    Silva, Alexandra
    Rutten, Jan
    INFORMATION AND COMPUTATION, 2010, 208 (05) : 578 - 593
  • [43] μ-Calculus of Process Trees with Their Application
    Guo Jing
    Xu Zhong-wei
    Yuan Kai-yan
    2014 IEEE WORKSHOP ON ELECTRONICS, COMPUTER AND APPLICATIONS, 2014, : 330 - 332
  • [44] Sequent Calculus in the Topos of Trees
    Clouston, Ranald
    Gore, Rajeev
    FOUNDATIONS OF SOFTWARE SCIENCE AND COMPUTATION STRUCTURES (FOSSACS 2015), 2015, 9034 : 133 - 147
  • [45] FOURIER CALCULUS ON EVOLUTIONARY TREES
    SZEKELY, LA
    STEEL, MA
    ERDOS, PL
    ADVANCES IN APPLIED MATHEMATICS, 1993, 14 (02) : 200 - 216
  • [46] Standardization and Bohm Trees for Λμ-Calculus
    Saurin, Alexis
    FUNCTIONAL AND LOGIC PROGRAMMING, PROCEEDINGS, 2010, 6009 : 134 - 149
  • [47] Integration of Formal Proof into Unified Assurance Cases with Isabelle/SACM
    Foster, Simon
    Nemouchi, Yakoub
    Gleirscher, Mario
    Wei, Ran
    Kelly, Tim
    FORMAL ASPECTS OF COMPUTING, 2021, 33 (06) : 855 - 884
  • [48] Attack Tree Analysis for Insider Threats on the IoT Using Isabelle
    Kammuller, Florian
    Nurse, Jason R. C.
    Probst, Christian W.
    HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY, AND TRUST, 2016, 9750 : 234 - 246
  • [49] Attribution of attack trees
    Whitley, John N.
    Phan, Raphael C-W
    Wang, Jie
    Parish, David J.
    COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (04) : 624 - 628
  • [50] Foundations of attack trees
    Mauw, Sjouke
    Oostdijk, Martijn
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2005, 2006, 3935 : 186 - 198