Commit dc4eab17 authored by Jaime Arias's avatar Jaime Arias
Browse files

add list of experiments

parent 8047ffdb
......@@ -26,6 +26,15 @@ In order to reproduce the results, the command to be executed is the following :
Below we show some case studies.
- [Forestalling a software release (forestall)](#forestalling-a-software-release-forestall)
- [Obtain admin privileges (gain-admin)](#obtain-admin-privileges-gain-admin)
- [Interrupted](#interrupted)
- [Compromise IoT device (iot-dev)](#compromise-iot-device-iot-dev)
- [Last](#last)
- [Example from [5]](#example-from-5)
- [Treasure Hunters](#treasure-hunters)
- [Scaling Example](#scaling-example)
### Forestalling a software release (forestall)
This model is based on a real-world instance [1]. It models an attack
......@@ -50,7 +59,7 @@ physical access to an already logged-in console or remote access via
privilege escalation (attacking SysAdmin). This case study [3] exhibits a
mostly branching structure: all gates but one are disjunctions in the
original tree of [3]. We enrich this scenario with the SAND gates of [2],
and further add reactive defences
and further add reactive defences.
#### ADTree model
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment