Commit b0f6bd39 authored by Jaime Arias's avatar Jaime Arias
Browse files

add toy-example adtree model

parent 5ba0116e
......@@ -9,7 +9,51 @@ git clone https://depot.lipn.univ-paris13.fr/parties/publications/minimal-schedu
## Folder Structure
## Models
## Results
### Treasure Hunters
It models thieves that try to steal a treasure in a museum. To achieve their
goal, they first must access the treasure room, which involves bribing a
guard (b), and forcing the secure door (f). Both actions are costly and take
some time. Two coalitions are possible: either a single thief has to carry
out both actions, or a second thief could be hired to parallelise b and f.
After these actions succeed the attacker/s can steal the treasure (ST), which
takes a little time for opening its display stand and putting it in a bag. If
the two-thieves coalition is used, we encode in ST an extra 90 € to hire the
second thief — the computation function of the gate can handle this plurality
— else ST incurs no extra cost. Then the thieves are ready to flee (TF),
choosing an escape route to get away (GA): this can be a spectacular escape
in a helicopter (h), or a mundane one via the emergency exit (e). The
helicopter is expensive but fast while the emergency exit is slower but at no
cost. Furthermore, the time to perform a successful escape could depend on
the number of agents involved in the robbery. Again, this can be encoded via
computation functions in gate GA.
As soon as the treasure room is penetrated (i.e. after b and f but before ST)
an alarm goes off at the police station, so while the thieves flee the police
hurries to intervene (p). The treasure is then successfully stolen iff the
thieves have fled and the police failed to arrive or does so too late. This
last possibility is captured by the condition associated with the treasure
stolen gate (TS), which states that the arrival time of the police must be
greater than the time for the thieves to steal the treasure and go away.
![Treasure Hunters ADTree](results/treasure-hunters/model/treasure-hunters.png)
### Compromise IoT device (iot-dev)
This model describes an attack to an Internet-of-Things (IoT) device either
via wireless or wired LAN. Once the attacker gains access to the private
network and has acquired the corresponding credentials, it can exploit a
software vulnerability in the IoT device to run a malicious script. Our
ADTree adds defence nodes on top of the attack trees used in [4].
![iot-dev ADTree](results/iot-dev/model/iot-dev.png)
### Toy Example
![toy-example ADTree](results/toy-example/model/toy-example.png)
## Authors
......@@ -18,4 +62,4 @@ git clone https://depot.lipn.univ-paris13.fr/parties/publications/minimal-schedu
- Laure Petrucci (LIPN, CNRS UMR 7030, Université Sorbonne Paris Nord)
- Teofil Sidoruk (Institute of Computer Science, PAS, Warsaw University of Technology)
## Abstract
\ No newline at end of file
## Abstract
\documentclass[preview]{standalone}
\input{../../base.tex}
\begin{document}
\begin{figure}
\centering
\scalebox{.75}{
\begin{tikzpicture}[every node/.style={ultra thick,draw=red}]
% depth 0
\node[and gate US,point up,logic gate inputs=nn] (a7) {\rotatebox{-90}{$A_7$}};
% depth 1
\node[and gate US,point up,logic gate inputs=nn,
below = 9mm of a7.west, yshift=14mm] (a6) {\rotatebox{-90}{$A_6$}};
\draw (a6.east) -- ([yshift=0.15cm]a6.east) -| (a7.input 1);
\node[state, below = 3.6mm of a7.west, xshift=9mm] (l8) {$l_8$};
\draw (l8.north) -- ([yshift=0.15cm]l8.north) -| (a7.input 2);
% depth 2
\node[and gate US,point up,logic gate inputs=nn,
below = 9mm of a6.west, yshift=30mm] (a4) {\rotatebox{-90}{$A_4$}};
\draw (a4.east) -- ([yshift=0.15cm]a4.east) -| (a6.input 1);
\node[and gate US,point up,logic gate inputs=nn,
below = 9mm of a6.west, yshift=-22mm] (a5) {\rotatebox{-90}{$A_5$}};
\draw (a5.east) -- ([yshift=0.15cm]a5.east) -| (a6.input 2);
% depth 3
\node[and gate US,point up,logic gate inputs=nn,
below = 9mm of a4.west, yshift=18mm] (a1) {\rotatebox{-90}{$A_1$}};
\draw (a1.east) -- ([yshift=0.15cm]a1.east) -| (a4.input 1);
\node[and gate US,point up,logic gate inputs=nn,
below = 9mm of a4.west, yshift=-10mm] (a2) {\rotatebox{-90}{$A_2$}};
\draw (a2.east) -- ([yshift=0.15cm]a2.east) -| (a4.input 2);
\node[and gate US,point up,logic gate inputs=nn,
below = 9mm of a5.west, yshift=14mm] (a3) {\rotatebox{-90}{$A_3$}};
\draw (a3.east) -- ([yshift=0.15cm]a3.east) -| (a5.input 1);
\node[state, below = 3.6mm of a5.west, xshift=9mm] (l7) {$l_7$};
\draw (l7.north) -- ([yshift=0.15cm]l7.north) -| (a5.input 2);
% depth 4
\node[state, below = 3.6mm of a1.west, xshift=-9mm] (l1) {$l_1$};
\draw (l1.north) -- ([yshift=0.15cm]l1.north) -| (a1.input 1);
\node[state, below = 3.6mm of a1.west, xshift=9mm] (l2) {$l_2$};
\draw (l2.north) -- ([yshift=0.15cm]l2.north) -| (a1.input 2);
\node[state, below = 3.6mm of a2.west, xshift=-9mm] (l3) {$l_3$};
\draw (l3.north) -- ([yshift=0.15cm]l3.north) -| (a2.input 1);
\node[state, below = 3.6mm of a2.west, xshift=9mm] (l4) {$l_4$};
\draw (l4.north) -- ([yshift=0.15cm]l4.north) -| (a2.input 2);
\node[state, below = 3.6mm of a3.west, xshift=-9mm] (l5) {$l_5$};
\draw (l5.north) -- ([yshift=0.15cm]l5.north) -| (a3.input 1);
\node[state, below = 3.6mm of a3.west, xshift=9mm] (l6) {$l_6$};
\draw (l6.north) -- ([yshift=0.15cm]l6.north) -| (a3.input 2);
\end{tikzpicture}
}
\end{figure}
\end{document}
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment