On linear logic, functional programming, and attack trees

Harley D Eades, Jiaming Jiang, Aubrey Bryant

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper has two main contributions. The first is a new linear logical semantics of causal attack trees in four-valued truth tables. Our semantics is very simple and expressive, supporting specializations, and supports the ideal semantics of causal attack trees, and partially supporting the filter semantics of causal attack trees. Our second contribution is Lina, a new embedded, in Haskell, domain specific functional programming language for conducting threat analysis using attack trees. Lina has many benefits over existing tools; for example, Lina allows one to specify attack trees very abstractly, which provides the ability to develop libraries of attack trees, furthermore, Lina is compositional, allowing one to break down complex attack trees into smaller ones that can be reasoned about and analyzed incrementally. Furthermore, Lina supports automatically proving properties of attack trees, such as equivalences and specializations, using Maude and the semantics introduced in this paper.

Original languageEnglish (US)
Title of host publicationGraphical Models for Security - 5th International Workshop, GraMSec 2018, Revised Selected Papers
EditorsDavid Pym, George Cybenko, Barbara Fila
PublisherSpringer Verlag
Pages71-89
Number of pages19
ISBN (Print)9783030154646
DOIs
StatePublished - Jan 1 2019
Event5th International Workshop on Graphical Models for Security, GraMSec 2018 - Oxford, United Kingdom
Duration: Jul 8 2018Jul 8 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11086 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference5th International Workshop on Graphical Models for Security, GraMSec 2018
CountryUnited Kingdom
CityOxford
Period7/8/187/8/18

Fingerprint

Functional programming
Functional Programming
Linear Logic
Semantics
Attack
Specialization
Computer programming languages
Truth table
Maude
Haskell
Programming Languages
Breakdown
Equivalence
Filter

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Eades, H. D., Jiang, J., & Bryant, A. (2019). On linear logic, functional programming, and attack trees. In D. Pym, G. Cybenko, & B. Fila (Eds.), Graphical Models for Security - 5th International Workshop, GraMSec 2018, Revised Selected Papers (pp. 71-89). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11086 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-030-15465-3_5

On linear logic, functional programming, and attack trees. / Eades, Harley D; Jiang, Jiaming; Bryant, Aubrey.

Graphical Models for Security - 5th International Workshop, GraMSec 2018, Revised Selected Papers. ed. / David Pym; George Cybenko; Barbara Fila. Springer Verlag, 2019. p. 71-89 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11086 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Eades, HD, Jiang, J & Bryant, A 2019, On linear logic, functional programming, and attack trees. in D Pym, G Cybenko & B Fila (eds), Graphical Models for Security - 5th International Workshop, GraMSec 2018, Revised Selected Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 11086 LNCS, Springer Verlag, pp. 71-89, 5th International Workshop on Graphical Models for Security, GraMSec 2018, Oxford, United Kingdom, 7/8/18. https://doi.org/10.1007/978-3-030-15465-3_5
Eades HD, Jiang J, Bryant A. On linear logic, functional programming, and attack trees. In Pym D, Cybenko G, Fila B, editors, Graphical Models for Security - 5th International Workshop, GraMSec 2018, Revised Selected Papers. Springer Verlag. 2019. p. 71-89. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-030-15465-3_5
Eades, Harley D ; Jiang, Jiaming ; Bryant, Aubrey. / On linear logic, functional programming, and attack trees. Graphical Models for Security - 5th International Workshop, GraMSec 2018, Revised Selected Papers. editor / David Pym ; George Cybenko ; Barbara Fila. Springer Verlag, 2019. pp. 71-89 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{42143292debb4378a00b904927bf6955,
title = "On linear logic, functional programming, and attack trees",
abstract = "This paper has two main contributions. The first is a new linear logical semantics of causal attack trees in four-valued truth tables. Our semantics is very simple and expressive, supporting specializations, and supports the ideal semantics of causal attack trees, and partially supporting the filter semantics of causal attack trees. Our second contribution is Lina, a new embedded, in Haskell, domain specific functional programming language for conducting threat analysis using attack trees. Lina has many benefits over existing tools; for example, Lina allows one to specify attack trees very abstractly, which provides the ability to develop libraries of attack trees, furthermore, Lina is compositional, allowing one to break down complex attack trees into smaller ones that can be reasoned about and analyzed incrementally. Furthermore, Lina supports automatically proving properties of attack trees, such as equivalences and specializations, using Maude and the semantics introduced in this paper.",
author = "Eades, {Harley D} and Jiaming Jiang and Aubrey Bryant",
year = "2019",
month = "1",
day = "1",
doi = "10.1007/978-3-030-15465-3_5",
language = "English (US)",
isbn = "9783030154646",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "71--89",
editor = "David Pym and George Cybenko and Barbara Fila",
booktitle = "Graphical Models for Security - 5th International Workshop, GraMSec 2018, Revised Selected Papers",

}

TY - GEN

T1 - On linear logic, functional programming, and attack trees

AU - Eades, Harley D

AU - Jiang, Jiaming

AU - Bryant, Aubrey

PY - 2019/1/1

Y1 - 2019/1/1

N2 - This paper has two main contributions. The first is a new linear logical semantics of causal attack trees in four-valued truth tables. Our semantics is very simple and expressive, supporting specializations, and supports the ideal semantics of causal attack trees, and partially supporting the filter semantics of causal attack trees. Our second contribution is Lina, a new embedded, in Haskell, domain specific functional programming language for conducting threat analysis using attack trees. Lina has many benefits over existing tools; for example, Lina allows one to specify attack trees very abstractly, which provides the ability to develop libraries of attack trees, furthermore, Lina is compositional, allowing one to break down complex attack trees into smaller ones that can be reasoned about and analyzed incrementally. Furthermore, Lina supports automatically proving properties of attack trees, such as equivalences and specializations, using Maude and the semantics introduced in this paper.

AB - This paper has two main contributions. The first is a new linear logical semantics of causal attack trees in four-valued truth tables. Our semantics is very simple and expressive, supporting specializations, and supports the ideal semantics of causal attack trees, and partially supporting the filter semantics of causal attack trees. Our second contribution is Lina, a new embedded, in Haskell, domain specific functional programming language for conducting threat analysis using attack trees. Lina has many benefits over existing tools; for example, Lina allows one to specify attack trees very abstractly, which provides the ability to develop libraries of attack trees, furthermore, Lina is compositional, allowing one to break down complex attack trees into smaller ones that can be reasoned about and analyzed incrementally. Furthermore, Lina supports automatically proving properties of attack trees, such as equivalences and specializations, using Maude and the semantics introduced in this paper.

UR - http://www.scopus.com/inward/record.url?scp=85064691812&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85064691812&partnerID=8YFLogxK

U2 - 10.1007/978-3-030-15465-3_5

DO - 10.1007/978-3-030-15465-3_5

M3 - Conference contribution

SN - 9783030154646

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 71

EP - 89

BT - Graphical Models for Security - 5th International Workshop, GraMSec 2018, Revised Selected Papers

A2 - Pym, David

A2 - Cybenko, George

A2 - Fila, Barbara

PB - Springer Verlag

ER -