Acknowledgments

Oleg Sheyner deserves all the credit for the technical contributions summarized in this chapter. The initial idea of using model checking to produce attack graphs is due to my collaboration with Somesh Jha.

All the ideas in this chapter can be found in greater detail in Oleg Sheyner’s doctoral dissertation [3]. Portions of his dissertation have appeared in conference and journal papers [1, 2, 5, 13, 16, 29]. This chapter draws largely from Wing’s summary paper [29] and Sheyner and Wing’s conference paper [16]; specific sections are reprinted in part from Wing [29], pp. 229234, with permission from IOS Press, and Sheyner and Wing [16], pp. 344371, Figures 2–7, with kind permission of Springer Science and Business Media.

This research is sponsored in part by the Army Research Office under contract no. DAAD19-01-1-0485 and DAAD19-02-1-0389, the National Science Foundation under grant no. CCR-0121547 and CNS-0433540, and the Software Engineering Institute through a U.S. government funding appropriation.

The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the sponsoring institutions, the U.S. Government, or any other entity.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset