ADTool: Security Analysis with Attack–Defense Trees

  • Barbara Kordy
  • Piotr Kordy
  • Sjouke Mauw
  • Patrick Schweitzer
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8054)

Abstract

ADTool is free, open source software assisting graphical modeling and quantitative analysis of security, using attack–defense trees. The main features of ADTool are easy creation, efficient editing, and automated bottom-up evaluation of security-relevant measures. The tool also supports the usage of attack trees, protection trees and defense trees, which are all particular instances of attack–defense trees.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bistarelli, S., Fioravanti, F., Peretti, P.: Defense Trees for Economic Evaluation of Security Investments. In: ARES 2006, pp. 416–423. IEEE Computer Society (2006)Google Scholar
  2. 2.
    Buchheim, C., Jünger, M., Leipert, S.: Drawing rooted trees in linear time. Software: Practice and Experience 36(6), 651–665 (2006)CrossRefGoogle Scholar
  3. 3.
    Demaine, E.D., Mozes, S., Rossman, B., Weimann, O.: An Optimal Decomposition Algorithm for Tree Edit Distance. ACM Trans. Algorithms 6(1), 2:1–2:19 (2009)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Edge, K.S., Dalton II, G.C., Raines, R.A., Mills, R.F.: Using Attack and Protection Trees to Analyze Threats and Defenses to Homeland Security. In: MILCOM, pp. 1–7. IEEE (2006)Google Scholar
  5. 5.
    Kordy, B., Kordy, P., Mauw, S., Schweitzer, P.: ADTool: Security Analysis with Attack–Defense Trees (Extended Version). CoRR abs/1305.6829 (2013)Google Scholar
  6. 6.
    Kordy, B., Mauw, S., Radomirović, S., Schweitzer, P.: Attack–Defense Trees. Journal of Logic and Computation pp. 1–33 (2012), http://logcom.oxfordjournals.org/content/early/2012/06/21/logcom.exs029.short?rss=1
  7. 7.
    Kordy, P., Schweitzer, P.: ADTool (2012), http://satoss.uni.lu/software/adtool
  8. 8.
    Mauw, S., Oostdijk, M.: Foundations of Attack Trees. In: Won, D., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 186–198. Springer, Heidelberg (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Barbara Kordy
    • 1
  • Piotr Kordy
    • 1
  • Sjouke Mauw
    • 1
  • Patrick Schweitzer
    • 1
  1. 1.University of Luxembourg, SnTLuxembourg

Personalised recommendations