Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
194 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
46 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Semantics of Attack-Defense Trees for Dynamic Countermeasures and a New Hierarchy of Star-free Languages (2312.00458v1)

Published 1 Dec 2023 in cs.FL

Abstract: We present a mathematical setting for attack-defense trees, a classic graphical model to specify attacks and countermeasures. We equip attack-defense trees with (trace) language semantics allowing to have an original dynamic interpretation of countermeasures. Interestingly, the expressiveness of attack-defense trees coincides with star-free languages, and the nested countermeasures impact the expressiveness of attack-defense trees. With an adequate notion of countermeasure-depth, we exhibit a strict hierarchy of the star-free languages that does not coincides with the classic one. Additionally, driven by the use of attack-defense trees in practice, we address the decision problems of trace membership and of non-emptiness, and study their computational complexities parameterized by the countermeasure-depth.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (24)
  1. Is my attack tree correct? In European Symposium on Research in Computer Security, pages 83–102. Springer, 2017.
  2. Adversarial formal semantics of attack trees and related problems. In P. Ganty and D. D. Monica, editors, Proceedings of the 13th International Symposium on Games, Automata, Logics and Formal Verification, GandALF 2022, Madrid, Spain, September 21-23, 2022, volume 370 of EPTCS, pages 162–177, 2022.
  3. V. Diekert and P. Gastin. First-order definable languages. In J. Flum, E. Grädel, and T. Wilke, editors, Logic and Automata: History and Perspectives [in Honor of Wolfgang Thomas], volume 2 of Texts in Logic and Games, pages 261–306. Amsterdam University Press, 2008.
  4. S. Eilenberg. Automata, languages, and machines. Academic press, 1974.
  5. Modelling attack-defense trees using timed automata. In Formal Modeling and Analysis of Timed Systems: 14th International Conference, FORMATS 2016, Quebec, QC, Canada, August 24-26, 2016, Proceedings 14, pages 35–50. Springer, 2016.
  6. Attack trees with sequential conjunction. In IFIP International Information Security and Privacy Conference, pages 339–353. Springer, 2015.
  7. Attack–defense trees. Journal of Logic and Computation, 24(1):55–87, 2014.
  8. Computational aspects of attack–defense trees. In Security and Intelligent Information Systems: International Joint Conferences, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers, pages 103–116. Springer, 2012.
  9. O. Kupferman and S. Zuhovitzky. An improved algorithm for the membership problem for extended regular expressions. In Mathematical Foundations of Computer Science 2002: 27th International Symposium, MFCS 2002 Warsaw, Poland, August 26–30, 2002 Proceedings 27, pages 446–458. Springer, 2002.
  10. S. Mauw and M. Oostdijk. Foundations of attack trees. In International Conference on Information Security and Cryptology, pages 186–198. Springer, 2005.
  11. R. McNaughton and S. A. Papert. Counter-Free Automata (MIT research monograph no. 65). The MIT Press, 1971.
  12. A. R. Meyer. Weak monadic second order theory of succesor is not elementary-recursive. In Logic Colloquium: Symposium on Logic Held at Boston, 1972–73, pages 132–154. Springer, 2006.
  13. D. Perrin and J.-E. Pin. First-order logic and star-free sets. Journal of Computer and System Sciences, 32(3):393–406, 1986.
  14. J. Pin, editor. Handbook of Automata Theory. European Mathematical Society Publishing House, Zürich, Switzerland, 2021.
  15. Variétés de langages formels, volume 17. Masson Paris, 1984.
  16. Towards synthesis of attack trees for supporting computer-aided risk analysis. In C. Canal and A. Idani, editors, Software Engineering and Formal Methods - SEFM 2014 Collocated Workshops: HOFM, SAFOME, OpenCert, MoKMaSD, WS-FMDS, Grenoble, France, September 1-2, 2014, Revised Selected Papers, volume 8938 of Lecture Notes in Computer Science, pages 363–375. Springer, 2014.
  17. T. Place and M. Zeitoun. The tale of the quantifier alternation hierarchy of first-order logic over words. ACM SIGLOG News, 2(3):4–17, 2015.
  18. G. Rozenberg and A. Salomaa. Handbook of Formal Languages: Volume 3 Beyond Words. Springer Science & Business Media, 2012.
  19. I. Schiering and W. Thomas. Counter-free automata, first-order logic, and star-free expressions extended by prefix oracles. Developments in Language Theory, II (Magdeburg, 1995), Worl Sci. Publishing, River Edge, NJ, pages 166–175, 1996.
  20. B. Schneier. Attack trees. Dr. Dobb’s journal, 24(12):21–29, 1999.
  21. L. J. Stockmeyer. The complexity of decision problems in automata theory and logic. PhD thesis, Massachusetts Institute of Technology, 1974.
  22. W. Thomas. Classifying regular events in symbolic logic. Journal of Computer and System Sciences, 25(3):360–376, 1982.
  23. W. Thomas. An application of the ehrenfeucht-fraïssé game in formal language theory. Bull. Soc. Math. France, 16(1):1–21, 1984.
  24. Beyond 2014: Formal methods for attack tree–based security modeling. ACM Computing Surveys (CSUR), 52(4):1–36, 2019.

Summary

We haven't generated a summary for this paper yet.