Abstract
We present a mathematical setting for attack-defense trees (adts), a classic graphical model to specify attacks and countermeasures. We equip adts with (trace) language semantics allowing to have an original dynamic interpretation of countermeasures. Interestingly, the expressiveness of adts coincides with star-free languages, and the nested countermeasures impact the expressiveness of adts. With an adequate notion of countermeasure-depth, we exhibit a strict hierarchy of the star-free languages that does not coincide with the classic one. Additionally, driven by the use of adts in practice, we address the decision problems of trace membership, non-emptiness, and equivalence, and study their computational complexities parameterized by the countermeasure-depth.
This work has been partly supported by the F.R.S.- FNRS under grant n\(^{\circ }\)T.0027.21 and a PHC Tournesol project.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
Arbitrary regular expressions extended with intersection and complementation.
- 3.
With the convention that 0-Expspace =Pspace.
References
Audinot, M., Pinchinat, S., Kordy, B.: Is my attack tree correct? In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10492, pp. 83–102. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66402-6_7
Brihaye, T., Pinchinat, S., Terefenko, A.: Adversarial formal semantics of attack trees and related problems. In: Ganty, P., Monica, D.D. (eds.) Proceedings of the 13th International Symposium on Games, Automata, Logics and Formal Verification, GandALF 2022, Madrid, 21–23 September 2022, vol. 370 of EPTCS, pp. 162–177 (2022)
Brihaye, T., Pinchinat, S., Terefenko, A.: Semantics of attack-defense trees for dynamic countermeasures and a new hierarchy of star-free languages. arXiv preprint arXiv:2312.00458 (2023)
Diekert, V., Gastin, P.: First-order definable languages. In: Flum, J., Grädel, E., Wilke, T. (eds.) Logic and Automata: History and Perspectives [in Honor of Wolfgang Thomas], vol. 2 of Texts in Logic and Games, pp. 261–306. Amsterdam University Press (2008)
Eilenberg, S.: Automata, Languages, and Machines. Academic Press (1974)
Gadyatskaya, O., Hansen, R.R., Larsen, K.G., Legay, A., Olesen, M.C., Poulsen, D.B.: Modelling attack-defense trees using timed automata. In: Fränzle, M., Markey, N. (eds.) Formal Modeling and Analysis of Timed Systems. LNCS, vol. 9884, pp. 35–50. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-44878-7_3
Jhawar, R., Kordy, B., Mauw, S., Radomirović, S., Trujillo-Rasua, R.: Attack trees with sequential conjunction. In: Federrath, H., Gollmann, D. (eds.) SEC 2015, pp. 339–353. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-18467-8_23
Kordy, B., Mauw, S., Radomirović, S., Schweitzer, P.: Attack-defense trees. J. Log. Comput. 24(1), 55–87 (2014)
Kordy, B., Pouly, M., Schweitzer, P.: Computational aspects of attack–defense trees. In: Bouvry, P., et al. (eds.) Security and Intelligent Information Systems, pp. 103–116. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-25261-7_8
Kupferman, O., Zuhovitzky, S.: An improved algorithm for the membership problem for extended regular expressions. In: Diks, K., Rytter, W. (eds.) Mathematical Foundations of Computer Science 2002: 27th International Symposium, MFCS 2002 Warsaw, 26–30 August 2002 Proceedings, pp. 446–458. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45687-2_37
Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Won, D.H., Kim, S. (eds.) Information Security and Cryptology - ICISC 2005. LNCS, vol. 3935, pp. 186–198. Springer, Heidelberg (2006). https://doi.org/10.1007/11734727_17
McNaughton, R., Papert, S.A.: Counter-Free Automata. MIT Research Monograph, vol. 65. The MIT Press (1971)
Meyer, A.R.: Weak monadic second order theory of succesor is not elementary-recursive. In: Parikh, R. (ed.) Logic Colloquium. LNM, vol. 453. Springer, Heidelberg (1975). https://doi.org/10.1007/BFb0064872
Perrin, D., Pin, J.-E.: First-order logic and star-free sets. J. Comput. Syst. Sci. 32(3), 393–406 (1986)
Pin, J. (ed.): Handbook of Automata Theory. European Mathematical Society Publishing House, Zürich (2021)
Pin, J.E., Schützenberger, M.P.: Variétés de Langages Formels, vol. 17. Masson, Paris (1984)
Pinchinat, S., Acher, M., Vojtisek, D.: Towards synthesis of attack trees for supporting computer-aided risk analysis. In: Canal, C., Idani, A. (eds.) Software Engineering and Formal Methods: SEFM 2014. LNCS, vol. 8938, pp. 363–375. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-15201-1_24
Place, T., Zeitoun, M.: The tale of the quantifier alternation hierarchy of first-order logic over words. ACM SIGLOG News 2(3), 4–17 (2015)
Rozenberg, G., Salomaa, A.: Handbook of Formal Languages, vol. 3 Beyond Words. Springer (2012)
Schiering, I., Thomas, W.: Counter-free automata, first-order logic, and star-free expressions extended by prefix oracles. Developments in Language Theory, II (Magdeburg, 1995), pp. 166–175. World Science Publishing, River Edge (1996)
Schneier, B.: Attack trees. Dr. Dobb’s J. 24(12), 21–29 (1999)
Stockmeyer, L.J.: The complexity of decision problems in automata theory and logic. Ph.D. thesis, Massachusetts Institute of Technology (1974)
Thomas, W.: Classifying regular events in symbolic logic. J. Comput. Syst. Sci. 25(3), 360–376 (1982)
Thomas, W.: An application of the ehrenfeucht-fraïssé game in formal language theory. Bull. Soc. Math. France 16(1), 1–21 (1984)
Wideł, W., Audinot, M., Fila, B., Pinchinat, S.: Beyond 2014: formal methods for attack tree-based security modeling. ACM Comput. Surv. 52(4), 1–36 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Brihaye, T., Pinchinat, S., Terefenko, A. (2024). Semantics of Attack-Defense Trees for Dynamic Countermeasures and a New Hierarchy of Star-Free Languages. In: Soto, J.A., Wiese, A. (eds) LATIN 2024: Theoretical Informatics. LATIN 2024. Lecture Notes in Computer Science, vol 14579. Springer, Cham. https://doi.org/10.1007/978-3-031-55601-2_17
Download citation
DOI: https://doi.org/10.1007/978-3-031-55601-2_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-55600-5
Online ISBN: 978-3-031-55601-2
eBook Packages: Computer ScienceComputer Science (R0)