, A deep flaw in your car lets hackers shut down safety features

. Sysml-sec,

. Ttool,

, OMG Systems Modeling Language (OMG SysML TM ), V1.0. Tech. rep., Object Management Group, 2007.

, Comput. Sci. Rev, vol.26, pp.1-16, 2017.

,

, Research chair Connected Cars and Cyber Security (C3S), 2019.

M. Audinot and S. Pinchinat, On the soundness of attack trees, vol.9987, pp.25-38, 2016.

S. Bistarelli, M. Dall'aglio, and P. Peretti, Strategic games on defense trees, Formal Aspects in Security and Trust, 2006.

K. Edge, G. Dalton, R. Raines, and R. Mills, Using attack and protection trees to analyze threats and defenses to homeland security, pp.1-7, 2006.

M. Fraile, M. Ford, O. Gadyatskaya, R. Kumar, M. Stoelinga et al., Using attack-defense trees to analyze threats and countermeasures in an atm: A case study, vol.267, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01653513

A. Garro and A. Tundis, A model-based method for system reliability analysis, vol.44, 2012.

X. Ji, H. Yu, G. Fan, and W. Fu, Attack-defense trees based cyber security analysis for cpss, 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), pp.693-698, 2016.

A. Jürgenson and J. Willemson, Computing exact outcomes of multi-parameter attack trees, OTM Conferences, 2008.

A. Jürgenson and J. Willemson, Serial model for attack tree computations, Proceedings of the 12th International Conference on Information Security and Cryptology. pp. 118-128. ICISC'09, 2010.

B. Kordy, P. Kordy, S. Mauw, P. Schweitzer, K. Joshi et al., Adtool: Security analysis with attack-defense trees, pp.173-176, 2013.

B. Kordy, S. Mauw, S. Radomirovic, and P. Schweitzer, Foundations of attackdefense trees, Formal Aspects in Security and Trust, 2010.

B. Kordy, L. Piètre-cambacédès, and P. Schweitzer, Dag-based attack and defense modeling: Don't miss the forest for the attack trees, p.2013

B. Kordy and W. Wide-l, On Quantitative Analysis of Attack-Defense Trees with Repeated Labels, pp.325-346, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01825088

A. Van-lamsweerde, Elaborating security requirements by construction of intentional anti-models, Proceedings of the 26th International Conference on Software Engineering, pp.148-157, 2004.

S. Mauw and M. Oostdijk, Foundations of attack trees, Proceedings of the 8th International Conference on Information Security and Cryptology. pp. 186-198. ICISC'05, 2006.

,

V. Saini, Q. Duan, and V. Paruchuri, Threat modeling using attack trees, J. Comput. Sci. Coll, vol.23, issue.4, pp.124-131, 2008.

B. Schneier, Secrets & Lies: Digital Security in a Networked World, 2000.

M. Steiner and P. Liggesmeyer, Qualitative and quantitative analysis of cfts taking security causes into account, Computer Safety, Reliability, and Security, pp.109-120, 2015.

S. Zhou, Q. Sun, and J. Jiao, A safety modeling method based on sysml, 2014 10th International Conference on Reliability, Maintainability and Safety (ICRMS), pp.1180-1185, 2014.