Deakin University
Browse

File(s) under permanent embargo

Using attack-defense trees to analyze threats and countermeasures in an ATM: A case study

conference contribution
posted on 2016-01-01, 00:00 authored by M Fraile, M Ford, O Gadyatskaya, R Kumar, M Stoelinga, R Trujillo-Rasua
© IFIP International Federation for Information Processing 2016. Securing automated teller machines (ATMs), as critical and complex infrastructure, requires a precise understanding of the associated threats. This paper reports on the application of attack-defense trees to model and analyze the security of ATMs.We capture the most dangerous multi-stage attack scenarios applicable to ATM structures, and establish a practical experience report, where we reflect on the process of modeling ATM threats via attack-defense trees. In particular, we share our insights into the benefits and drawbacks of attack-defense tree modeling, as well as best practices and lessons learned.

History

Pagination

326-334

Location

Skovde, Sweden

Start date

2016-11-08

End date

2016-11-10

ISSN

1865-1348

ISBN-13

9783319483924

Language

eng

Publication classification

E Conference publication, E1.1 Full written paper - refereed

Copyright notice

2016, IFIP International Federation for Information Processing

Editor/Contributor(s)

Horkoff J, Jeusfeld M, Persson A

Title of proceedings

PoEM 2016 : The practice of enterprise modeling : 9th IFIP WG 8.1. Working Conference, PoEM 2016, Skövde, Sweden, November 8-10, 2016, Proceedings

Event

Practice of Enterprise Modeling. IFIP Working Conference (2016 : 9th : Skovde, Sweden)

Publisher

Springer

Place of publication

Berlin, Germany

Series

Lecture notes in business information processing ; 267

Usage metrics

    Research Publications

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC