Palladio Attack Propagation

Contents:

  • Installation
  • Application Scenarios
  • User Documentation
    • Palladio
    • Modelling Access Control Properties
    • Modeling Attackers & Vulnerabilities
    • Analysing Scenario-based Access Control Policies
    • Analyzing Attack Propagations
    • Analyzing Targeted Attack Paths
  • Developer Documentation
Palladio Attack Propagation
  • User Documentation
  • Edit on GitHub

User Documentation

Here, we describe the general usage of our tooling. In the different sections, we explain different parts based on our running example (see Maintenance Scenario (Running Example)). We recommend reading beforehand the section about the background and the architectural model.

Contents:

  • Palladio
    • Screencast Palladio
  • Modelling Access Control Properties
  • Modeling Attackers & Vulnerabilities
    • Vulnerability Container
    • Category Specification
    • PCM Integration
    • Attack Propagation Specific Modelling
    • Targeted Attack Graph Analyzis
  • Analysing Scenario-based Access Control Policies
    • Analysis Execution
    • Analysis Results
  • Analyzing Attack Propagations
    • Scientific Background
    • Screencast for Attack Propagation
    • Analysis Execution
    • Analysis Results
  • Analyzing Targeted Attack Paths
    • Scientific Background
    • Analysis Model Input
    • Analysis Execution
    • Analysis Results
Previous Next

© Copyright 2023, DSiS, KASTEL, Karlsruhe Institute of Technology (KIT).

Built with Sphinx using a theme provided by Read the Docs.