Proposing a New Foundation of Attack Trees in Monoidal Categories
نویسنده
چکیده
This short paper introduces a new project studying at the intersection of threat analysis using attack trees and interactive theorem proving using linear logic. The project proposes a new semantics of attack trees in dialectica spaces, a well-known model of intuitionistic linear logic, which offers two new branching operators to attack trees. Then by exploiting the Curry-Howard-Lambek correspondence it seeks to develop a domain-specific linear functional programming language called Lina – for Linear Threat Analysis – for specifying and reasoning about attack trees.
منابع مشابه
A New Foundation of Attribute Grammars in Traced Symmetric Monoidal Categories
In this paper we propose a new categorical formulation of attribute grammars in traced symmetric monoidal categories. The new formulation, called monoidal attribute grammars, concisely captures the essence of the classical attribute grammars. We study monoidal attribute grammars in two categories: Rel and ωCPPO. It turns out that in Rel monoidal attribute grammars correspond to the graphtheoret...
متن کاملThe symmetric monoidal closed category of cpo $M$-sets
In this paper, we show that the category of directed complete posets with bottom elements (cpos) endowed with an action of a monoid $M$ on them forms a monoidal category. It is also proved that this category is symmetric closed.
متن کاملDuality and Traces for Indexed Monoidal Categories
By the Lefschetz fixed point theorem, if an endomorphism of a topological space is fixed-point-free, then its Lefschetz number vanishes. This necessary condition is not usually sufficient, however; for that we need a refinement of the Lefschetz number called the Reidemeister trace. Abstractly, the Lefschetz number is a trace in a symmetric monoidal category, while the Reidemeister trace is a tr...
متن کاملTracing the Man in the Middle in Monoidal Categories
Man-in-the-Middle (MM) is not only a ubiquitous attack pattern in security, but also an important paradigm of network computation and economics. Recognizing ongoing MM-attacks is an important security task; modeling MM-interactions is an interesting task for semantics of computation. Traced monoidal categories are a natural framework for MM-modelling, as the trace structure provides a tool to h...
متن کاملNew Fixed Point Attacks on GOST2 Block Cipher
GOST block cipher designed in the 1970s and published in 1989 as the Soviet and Russian standard GOST 28147-89. In order to enhance the security of GOST block cipher after proposing various attacks on it, designers published a modified version of GOST, namely GOST2, in 2015 which has a new key schedule and explicit choice for S-boxes. In this paper, by using three exactly identical portions of ...
متن کامل