Commit 6f7b812d authored by Jaime Arias's avatar Jaime Arias
Browse files

update README

parent 0ffa3ab8
......@@ -16,6 +16,72 @@ git clone https://depot.lipn.univ-paris13.fr/parties/publications/minimal-schedu
## Results
### Forestall
#### ADTree model
![forestall ADTree](results/forestall/model/forestall.png)
#### Minimal Scheduling
<!-- ![forestall Assignment](results/forestall/assignment/forestall_scheduling.png) -->
### Gain Admin
#### ADTree model
![gain-admin ADTree](results/gain-admin/model/gain-admin.png)
#### Minimal Scheduling
<!-- ![gain-admin Assignment](results/gain-admin/assignment/gain_admin_scheduling.png) -->
### Interrupted
#### ADTree model
![interrupted ADTree](results/interrupted/model/interrupted.png)
#### Minimal Scheduling
![interrupted Assignment](results/interrupted/assignment/interrupted_scheduling_1.png)
### Compromise IoT device (iot-dev)
This model describes an attack to an Internet-of-Things (IoT) device either
via wireless or wired LAN. Once the attacker gains access to the private
network and has acquired the corresponding credentials, it can exploit a
software vulnerability in the IoT device to run a malicious script. Our
ADTree adds defence nodes on top of the attack trees used in [4].
#### ADTree model
![iot-dev ADTree](results/iot-dev/model/iot-dev.png)
#### Minimal Scheduling
<!-- ![iot-dev Assignment](results/iot-dev/assignment/iot-dev_scheduling.png) -->
### Last
#### ADTree model
![last ADTree](results/last/model/last.png)
#### Minimal Scheduling
![last Assignment](results/last/assignment/last_scheduling_1.png)
### Toy Example
#### ADTree model
![toy-example ADTree](results/toy-example/model/toy-example.png)
#### Minimal Scheduling
![toy-example Assignment](results/toy-example/assignment/toy_example_scheduling_1.png)
### Treasure Hunters
It models thieves that try to steal a treasure in a museum. To achieve their
......@@ -49,33 +115,15 @@ greater than the time for the thieves to steal the treasure and go away.
#### Minimal Scheduling
![treasure-hunters Assignment](results/treasure-hunters/assignment/treasure-hunters_scheduling_1.png)
### Toy Example
### Tricky
#### ADTree model
![toy-example ADTree](results/toy-example/model/toy-example.png)
#### Minimal Scheduling
![toy-example Assignment](results/toy-example/assignment/toy-example_scheduling_1.png)
### Compromise IoT device (iot-dev)
This model describes an attack to an Internet-of-Things (IoT) device either
via wireless or wired LAN. Once the attacker gains access to the private
network and has acquired the corresponding credentials, it can exploit a
software vulnerability in the IoT device to run a malicious script. Our
ADTree adds defence nodes on top of the attack trees used in [4].
#### ADTree model
![iot-dev ADTree](results/iot-dev/model/iot-dev.png)
![tricky ADTree](results/tricky/model/tricky.png)
#### Minimal Scheduling
![iot-dev Assignment](results/iot-dev/assignment/iot-dev_scheduling.png)
![tricky Assignment](results/tricky/assignment/tricky_scheduling_1.png)
## Authors
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment