File(s) under permanent embargo
Using attack-defense trees to analyze threats and countermeasures in an ATM: A case study
conference contribution
posted on 2016-01-01, 00:00 authored by M Fraile, M Ford, O Gadyatskaya, R Kumar, M Stoelinga, R Trujillo-Rasua© IFIP International Federation for Information Processing 2016. Securing automated teller machines (ATMs), as critical and complex infrastructure, requires a precise understanding of the associated threats. This paper reports on the application of attack-defense trees to model and analyze the security of ATMs.We capture the most dangerous multi-stage attack scenarios applicable to ATM structures, and establish a practical experience report, where we reflect on the process of modeling ATM threats via attack-defense trees. In particular, we share our insights into the benefits and drawbacks of attack-defense tree modeling, as well as best practices and lessons learned.
History
Pagination
326-334Location
Skovde, SwedenPublisher DOI
Start date
2016-11-08End date
2016-11-10ISSN
1865-1348ISBN-13
9783319483924Language
engPublication classification
E Conference publication, E1.1 Full written paper - refereedCopyright notice
2016, IFIP International Federation for Information ProcessingEditor/Contributor(s)
Horkoff J, Jeusfeld M, Persson ATitle of proceedings
PoEM 2016 : The practice of enterprise modeling : 9th IFIP WG 8.1. Working Conference, PoEM 2016, Skövde, Sweden, November 8-10, 2016, ProceedingsEvent
Practice of Enterprise Modeling. IFIP Working Conference (2016 : 9th : Skovde, Sweden)Publisher
SpringerPlace of publication
Berlin, GermanySeries
Lecture notes in business information processing ; 267Usage metrics
Keywords
Licence
Exports
RefWorksRefWorks
BibTeXBibTeX
Ref. managerRef. manager
EndnoteEndnote
DataCiteDataCite
NLMNLM
DCDC