9.8. Related Work
Generating a set of all counterexamples is a novel addition to the repertoire of model checking techniques. Sheyner’s dissertation [3] gives the most comprehensive description of scenario graphs and algorithms for generating them. We restrict the remainder of our discussion of related work to attack graphs.
Phillips and Swiler [17] propose the concept of attack graphs that is similar to the one described here. However, they take an “attack-centric” view of the system. Since we work with a general modeling language, we can express in our model both seemingly benign system events (such as failure of a link) and malicious events (such as attacks). Therefore, our attack graphs are more general than the one proposed by Phillips ...
Get Information Assurance now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.