Datasets:

Modalities:
Text
Languages:
English
Libraries:
Datasets
License:
File size: 2,509 Bytes
4365a98
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
\documentclass[11pt,a4paper]{article}
\usepackage[T1]{fontenc}
\usepackage{isabelle,isabellesym}

% further packages required for unusual symbols (see also
% isabellesym.sty), use only when needed

%\usepackage{amssymb}
  %for \<leadsto>, \<box>, \<diamond>, \<sqsupset>, \<mho>, \<Join>,
  %\<lhd>, \<lesssim>, \<greatersim>, \<lessapprox>, \<greaterapprox>,
  %\<triangleq>, \<yen>, \<lozenge>

%\usepackage{eurosym}
  %for \<euro>

%\usepackage[only,bigsqcap]{stmaryrd}
  %for \<Sqinter>

%\usepackage{eufrak}
  %for \<AA> ... \<ZZ>, \<aa> ... \<zz> (also included in amssymb)

%\usepackage{textcomp}
  %for \<onequarter>, \<onehalf>, \<threequarters>, \<degree>, \<cent>,
  %\<currency>

% this should be the last package used
\usepackage{pdfsetup}

% urls in roman style, theory text in math-similar italics
\urlstyle{rm}
\isabellestyle{it}

% for uniform font size
%\renewcommand{\isastyle}{\isastyleminor}


\begin{document}


\title{Attack Trees in Isabelle for GDPR compliance of IoT healthcare systems}
\author{Florian Kamm\"uller}

\maketitle

\begin{abstract}
In this article, we present a proof theory for Attack Trees. Attack Trees are a well established and 
useful model for the construction of attacks on systems since they allow a stepwise exploration of 
high level attacks in application scenarios. Using the expressiveness of Higher Order Logic in Isabelle, 
we succeed in developing a generic theory of Attack Trees with a state-based semantics based on Kripke 
structures and CTL (see \cite{kam:16b} for more details). 
The resulting framework allows mechanically supported logic analysis of the meta-theory 
of the proof calculus of Attack Trees and at the same time the developed proof theory enables application 
to case studies. 
A central correctness and completeness result proved in Isabelle establishes a connection 
between the notion of Attack tTree validity and CTL. 
The application is illustrated on the example of a healthcare IoT system and GDPR compliance verification.
A more detailed account of the Attack Tree formalisation is given in \cite{kam:18b} and the case study 
is described in detail in \cite{kam:18a}.
%bla \cite{kk:16}\cite{kp:16}\cite{mw:09}\cite{kk:20}
\end{abstract}
\tableofcontents

% sane default for proof documents
\parindent 0pt\parskip 0.5ex

% generated text of all theories
\input{session}

% optional bibliography
\bibliographystyle{abbrv}
\bibliography{root}


\end{document}

%%% Local Variables:
%%% mode: latex
%%% TeX-master: t
%%% End: