Published November 20, 2024
| Version v1
Software
Open
How hard can it be? Quantifying MITRE attack campaigns with attack trees and cATM logic (experimental reproduction package)
Creators
Description
This artifact permits to reproduce the experimental results obtained with the techniques and algorithms presented in the paper "How hard can it be? Quantifying MITRE attack campaigns with attack trees and cATM logic" by Nicoletti et al. (to appear).
The contents include the dataset and the algorithms used in the presented method, to perform quantitative comparisons of MITRE ATT&CK Enterprise Campaigns—see https://attack.mitre.org/campaigns/.
Files
README.md
Additional details
Funding
- European Commission
- ProSVED – Projection of Security Vulnerabilities caused by Exploits in Dependencies 101067199
- European Commission
- CAESAR – Integrating Safety and Cybersecurity through Stochastic Model Checking 864075
- Ministero dell'università e della ricerca
- Smartitude - PRIN 2022 - NextGenerationEU D53D23008400006
- Ministero dell'università e della ricerca
- SERICS - PNRR - NextGenerationEU PE00000014
- Dutch Research Council
- PrimaVera: Predictive maintenance for Very effective asset management 33696
- European Research Council
- RUBICON 101187945