Attack-Defense Trees for Abusing Optical Power Meters: A Case Study and the OSEAD Tool Experience Report

Tampering with their power meter might be tempting to many people. Appropriately configured home-placed meter will record lower than the actual electricity consumption, resulting in substantial savings for the household. Organizations such as national departments of energy have thus been interested in analyzing the feasibility of illegal activities of this type. Indeed, since nearly every apartment is equipped with a power meter, the negative financial impact of tampering implemented at a large scale might be disastrous for electricity providers.

[1]  Barbara Kordy,et al.  On Quantitative Analysis of Attack-Defense Trees with Repeated Labels , 2018, POST.

[2]  Arend Rensink,et al.  Effective Analysis of Attack Trees: A Model-Driven Approach , 2018, FASE.

[3]  Barbara Kordy,et al.  Attack-defense trees , 2014, J. Log. Comput..

[4]  Barbara Kordy,et al.  Efficient Attack-Defense Tree Analysis using Pareto Attribute Domains , 2019, 2019 IEEE 32nd Computer Security Foundations Symposium (CSF).

[5]  Barbara Kordy,et al.  Probabilistic reasoning with graphical security models , 2016, Inf. Sci..

[6]  Reza Pulungan,et al.  Time-Dependent Analysis of Attacks , 2014, POST.

[7]  Kim G. Larsen,et al.  Modelling Attack-defense Trees Using Timed Automata , 2016, FORMATS.

[8]  Olga Gadyatskaya,et al.  Using Attack-Defense Trees to Analyze Threats and Countermeasures in an ATM: A Case Study , 2016, PoEM.

[9]  Olga Gadyatskaya,et al.  Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0 , 2016, QEST.

[10]  Mariëlle Stoelinga,et al.  DFTCalc: a tool for efficient fault tree analysis (extended version) , 2013 .

[11]  Sophie Pinchinat,et al.  Beyond 2014 , 2019, ACM Comput. Surv..

[12]  Flemming Nielson,et al.  Pareto Efficient Solutions of Attack-Defence Trees , 2015, POST.

[13]  Barbara Kordy,et al.  How Well Can I Secure My System? , 2017, IFM.

[14]  Ketil Stølen,et al.  Model-Driven Risk Analysis - The CORAS Approach , 2010 .

[15]  Barbara Kordy,et al.  Evil Twins: Handling Repetitions in Attack-Defense Trees - A Survival Guide , 2017, GraMSec@CSF.

[16]  Sjouke Mauw,et al.  Foundations of Attack Trees , 2005, ICISC.

[17]  R.F. Mills,et al.  Using Attack and Protection Trees to Analyze Threats and Defenses to Homeland Security , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[18]  Barbara Kordy,et al.  Quantitative Questions on Attack-Defense Trees , 2012, ICISC.

[19]  Alexander Pretschner,et al.  Enhancement of Automotive Penetration Testing with Threat Analyses Results , 2018 .