Scenario Graphs Applied to Security ( Summary Paper )

Traditional model checking produces one counterexample to illustrate a violation of a property by a model of the system. Some applications benefit from having all counterexamples, not just one. We call this set of counterexamples a scenario graph. In this paper we present two different algorithms for producing scenario graphs and explain how scenario graphs are a natural representation for attack graphs used in the security community.