Skip to main content

Semantics of Attack-Defense Trees for Dynamic Countermeasures and a New Hierarchy of Star-Free Languages

  • Conference paper
  • First Online:
LATIN 2024: Theoretical Informatics (LATIN 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14579))

Included in the following conference series:

  • 72 Accesses

Abstract

We present a mathematical setting for attack-defense trees (adts), a classic graphical model to specify attacks and countermeasures. We equip adts with (trace) language semantics allowing to have an original dynamic interpretation of countermeasures. Interestingly, the expressiveness of adts coincides with star-free languages, and the nested countermeasures impact the expressiveness of adts. With an adequate notion of countermeasure-depth, we exhibit a strict hierarchy of the star-free languages that does not coincide with the classic one. Additionally, driven by the use of adts in practice, we address the decision problems of trace membership, non-emptiness, and equivalence, and study their computational complexities parameterized by the countermeasure-depth.

This work has been partly supported by the F.R.S.- FNRS under grant n\(^{\circ }\)T.0027.21 and a PHC Tournesol project.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.schneier.com/academic/archives/1999/12/attack_trees.html.

  2. 2.

    Arbitrary regular expressions extended with intersection and complementation.

  3. 3.

    With the convention that 0-Expspace =Pspace.

References

  1. Audinot, M., Pinchinat, S., Kordy, B.: Is my attack tree correct? In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10492, pp. 83–102. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66402-6_7

  2. Brihaye, T., Pinchinat, S., Terefenko, A.: Adversarial formal semantics of attack trees and related problems. In: Ganty, P., Monica, D.D. (eds.) Proceedings of the 13th International Symposium on Games, Automata, Logics and Formal Verification, GandALF 2022, Madrid, 21–23 September 2022, vol. 370 of EPTCS, pp. 162–177 (2022)

    Google Scholar 

  3. Brihaye, T., Pinchinat, S., Terefenko, A.: Semantics of attack-defense trees for dynamic countermeasures and a new hierarchy of star-free languages. arXiv preprint arXiv:2312.00458 (2023)

  4. Diekert, V., Gastin, P.: First-order definable languages. In: Flum, J., Grädel, E., Wilke, T. (eds.) Logic and Automata: History and Perspectives [in Honor of Wolfgang Thomas], vol. 2 of Texts in Logic and Games, pp. 261–306. Amsterdam University Press (2008)

    Google Scholar 

  5. Eilenberg, S.: Automata, Languages, and Machines. Academic Press (1974)

    Google Scholar 

  6. Gadyatskaya, O., Hansen, R.R., Larsen, K.G., Legay, A., Olesen, M.C., Poulsen, D.B.: Modelling attack-defense trees using timed automata. In: Fränzle, M., Markey, N. (eds.) Formal Modeling and Analysis of Timed Systems. LNCS, vol. 9884, pp. 35–50. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-44878-7_3

  7. Jhawar, R., Kordy, B., Mauw, S., Radomirović, S., Trujillo-Rasua, R.: Attack trees with sequential conjunction. In: Federrath, H., Gollmann, D. (eds.) SEC 2015, pp. 339–353. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-18467-8_23

  8. Kordy, B., Mauw, S., Radomirović, S., Schweitzer, P.: Attack-defense trees. J. Log. Comput. 24(1), 55–87 (2014)

    Article  MathSciNet  Google Scholar 

  9. Kordy, B., Pouly, M., Schweitzer, P.: Computational aspects of attack–defense trees. In: Bouvry, P., et al. (eds.) Security and Intelligent Information Systems, pp. 103–116. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-25261-7_8

  10. Kupferman, O., Zuhovitzky, S.: An improved algorithm for the membership problem for extended regular expressions. In: Diks, K., Rytter, W. (eds.) Mathematical Foundations of Computer Science 2002: 27th International Symposium, MFCS 2002 Warsaw, 26–30 August 2002 Proceedings, pp. 446–458. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45687-2_37

  11. Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Won, D.H., Kim, S. (eds.) Information Security and Cryptology - ICISC 2005. LNCS, vol. 3935, pp. 186–198. Springer, Heidelberg (2006). https://doi.org/10.1007/11734727_17

  12. McNaughton, R., Papert, S.A.: Counter-Free Automata. MIT Research Monograph, vol. 65. The MIT Press (1971)

    Google Scholar 

  13. Meyer, A.R.: Weak monadic second order theory of succesor is not elementary-recursive. In: Parikh, R. (ed.) Logic Colloquium. LNM, vol. 453. Springer, Heidelberg (1975). https://doi.org/10.1007/BFb0064872

  14. Perrin, D., Pin, J.-E.: First-order logic and star-free sets. J. Comput. Syst. Sci. 32(3), 393–406 (1986)

    Article  MathSciNet  Google Scholar 

  15. Pin, J. (ed.): Handbook of Automata Theory. European Mathematical Society Publishing House, Zürich (2021)

    Google Scholar 

  16. Pin, J.E., Schützenberger, M.P.: Variétés de Langages Formels, vol. 17. Masson, Paris (1984)

    Google Scholar 

  17. Pinchinat, S., Acher, M., Vojtisek, D.: Towards synthesis of attack trees for supporting computer-aided risk analysis. In: Canal, C., Idani, A. (eds.) Software Engineering and Formal Methods: SEFM 2014. LNCS, vol. 8938, pp. 363–375. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-15201-1_24

  18. Place, T., Zeitoun, M.: The tale of the quantifier alternation hierarchy of first-order logic over words. ACM SIGLOG News 2(3), 4–17 (2015)

    Article  Google Scholar 

  19. Rozenberg, G., Salomaa, A.: Handbook of Formal Languages, vol. 3 Beyond Words. Springer (2012)

    Google Scholar 

  20. Schiering, I., Thomas, W.: Counter-free automata, first-order logic, and star-free expressions extended by prefix oracles. Developments in Language Theory, II (Magdeburg, 1995), pp. 166–175. World Science Publishing, River Edge (1996)

    Google Scholar 

  21. Schneier, B.: Attack trees. Dr. Dobb’s J. 24(12), 21–29 (1999)

    Google Scholar 

  22. Stockmeyer, L.J.: The complexity of decision problems in automata theory and logic. Ph.D. thesis, Massachusetts Institute of Technology (1974)

    Google Scholar 

  23. Thomas, W.: Classifying regular events in symbolic logic. J. Comput. Syst. Sci. 25(3), 360–376 (1982)

    Article  MathSciNet  Google Scholar 

  24. Thomas, W.: An application of the ehrenfeucht-fraïssé game in formal language theory. Bull. Soc. Math. France 16(1), 1–21 (1984)

    MathSciNet  Google Scholar 

  25. Wideł, W., Audinot, M., Fila, B., Pinchinat, S.: Beyond 2014: formal methods for attack tree-based security modeling. ACM Comput. Surv. 52(4), 1–36 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thomas Brihaye .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Brihaye, T., Pinchinat, S., Terefenko, A. (2024). Semantics of Attack-Defense Trees for Dynamic Countermeasures and a New Hierarchy of Star-Free Languages. In: Soto, J.A., Wiese, A. (eds) LATIN 2024: Theoretical Informatics. LATIN 2024. Lecture Notes in Computer Science, vol 14579. Springer, Cham. https://doi.org/10.1007/978-3-031-55601-2_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-55601-2_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-55600-5

  • Online ISBN: 978-3-031-55601-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics