On linear logic, functional programming, and attack trees

Harley Eades, Jiaming Jiang, Aubrey Bryant

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper has two main contributions. The first is a new linear logical semantics of causal attack trees in four-valued truth tables. Our semantics is very simple and expressive, supporting specializations, and supports the ideal semantics of causal attack trees, and partially supporting the filter semantics of causal attack trees. Our second contribution is Lina, a new embedded, in Haskell, domain specific functional programming language for conducting threat analysis using attack trees. Lina has many benefits over existing tools; for example, Lina allows one to specify attack trees very abstractly, which provides the ability to develop libraries of attack trees, furthermore, Lina is compositional, allowing one to break down complex attack trees into smaller ones that can be reasoned about and analyzed incrementally. Furthermore, Lina supports automatically proving properties of attack trees, such as equivalences and specializations, using Maude and the semantics introduced in this paper.

Original languageEnglish (US)
Title of host publicationGraphical Models for Security - 5th International Workshop, GraMSec 2018, Revised Selected Papers
EditorsDavid Pym, George Cybenko, Barbara Fila
PublisherSpringer Verlag
Pages71-89
Number of pages19
ISBN (Print)9783030154646
DOIs
StatePublished - Jan 1 2019
Event5th International Workshop on Graphical Models for Security, GraMSec 2018 - Oxford, United Kingdom
Duration: Jul 8 2018Jul 8 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11086 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference5th International Workshop on Graphical Models for Security, GraMSec 2018
CountryUnited Kingdom
CityOxford
Period7/8/187/8/18

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'On linear logic, functional programming, and attack trees'. Together they form a unique fingerprint.

  • Cite this

    Eades, H., Jiang, J., & Bryant, A. (2019). On linear logic, functional programming, and attack trees. In D. Pym, G. Cybenko, & B. Fila (Eds.), Graphical Models for Security - 5th International Workshop, GraMSec 2018, Revised Selected Papers (pp. 71-89). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11086 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-030-15465-3_5