Assessing Security of Cryptocurrencies with Attack-Defense Trees: Proof of Concept and Future Directions

[1]  Jan Křetínský,et al.  Expected Cost Analysis of Attack-Defense Trees , 2019, QEST.

[2]  Axel Legay,et al.  Mitigating Security Risks Through Attack Strategies Exploration , 2018, ISoLA.

[3]  Matteo Maffei,et al.  Foundations and Tools for the Static Analysis of Ethereum Smart Contracts , 2018, CAV.

[4]  Yan Wang,et al.  A survey on security and privacy issues of blockchain technology , 2018, Math. Found. Comput..

[5]  Barbara Kordy,et al.  On Quantitative Analysis of Attack-Defense Trees with Repeated Labels , 2018, POST.

[6]  Krishnendu Chatterjee,et al.  Quantitative Analysis of Smart Contracts , 2018, ESOP.

[7]  Mauro Conti,et al.  A Survey on Security and Privacy Issues of Bitcoin , 2017, IEEE Communications Surveys & Tutorials.

[8]  Sylvain Guilley,et al.  Attack Tree Construction and Its Application to the Connected Vehicle , 2018, Cyber-Physical Systems Security.

[9]  Jin B. Hong,et al.  A survey on the usability and practical applications of Graphical Security Models , 2017, Comput. Sci. Rev..

[10]  Barbara Kordy,et al.  Evil Twins: Handling Repetitions in Attack-Defense Trees - A Survival Guide , 2017, GraMSec@CSF.

[11]  Olga Gadyatskaya,et al.  New Directions in Attack Tree Research: Catching up with Industrial Needs , 2017, GraMSec@CSF.

[12]  Flemming Nielson,et al.  Model Checking Exact Cost for Attack Scenarios , 2017, POST.

[13]  Olga Gadyatskaya,et al.  Using Attack-Defense Trees to Analyze Threats and Countermeasures in an ATM: A Case Study , 2016, PoEM.

[14]  Ali E. Abdallah,et al.  Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis , 2016 .

[15]  Jean-Michel Fourneau,et al.  Quantitative Attack Tree Analysis: Stochastic Bounds and Numerical Analysis , 2016, GraMSec@CSF.

[16]  Edgar R. Weippl,et al.  The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy , 2016, Financial Cryptography.

[17]  Aviv Zohar,et al.  Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.

[18]  Barbara Kordy,et al.  Attack Trees with Sequential Conjunction , 2015, SEC.

[19]  Mariëlle Stoelinga,et al.  Fault tree analysis: A survey of the state-of-the-art in modeling, analysis and tools , 2014, Comput. Sci. Rev..

[20]  Reza Pulungan,et al.  Time-Dependent Analysis of Attacks , 2014, POST.

[21]  József Mezei,et al.  Combining attack trees and fuzzy numbers in a multi-agent approach to fraud detection , 2011, Int. J. Electron. Bus..

[22]  Barbara Kordy,et al.  Foundations of Attack-Defense Trees , 2010, Formal Aspects in Security and Trust.

[23]  Luigi Portinale,et al.  Improving the analysis of dependable systems by mapping fault trees into Bayesian networks , 2001, Reliab. Eng. Syst. Saf..