Mantel, HeikoHeikoMantelProbst, Christian W.Christian W.Probst2022-10-182022-10-182019-06-2532nd IEEE Computer Security Foundations Symposium (CSF 2019)http://hdl.handle.net/11420/13799Attack trees are a popular notation for describing threats to systems, both in academia and industry. Originally, attack trees lacked a formal semantics, but formal semantics for different variants of attack trees were proposed later. These semantics focus on the attacker's actions defined in the leaves and the logical structure defined by the inner nodes of an attack tree. Surprisingly, they do not clarify the connection to the goal defined at the root node in a satisfactory fashion. In this article, we aim at a better clarification of this connection between the attacks and the attacker goal specified by an attack tree. We argue that there are multiple sensible success criteria for attacks wrt. a given attacker goal and develop a framework for defining such criteria. We exploit our framework to identify similarities and differences between automatic attack-tree generation techniques. Finally, we propose a novel variant of attack trees that allows one to express exploits in an explicit fashion.enAttack treesSecurity engineeringThreat modelingInformatikOn the meaning and purpose of attack treesConference Paper10.1109/CSF.2019.00020Other