Skip to main content

Showing 1–11 of 11 results for author: Nicoletti, S M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.23841  [pdf, ps, other

    cs.CR cs.SE

    An ontological lens on attack trees: Toward adequacy and interoperability

    Authors: Ítalo Oliveira, Stefano M. Nicoletti, Gal Engelberg, Mattia Fumagalli, Dan Klein, Giancarlo Guizzardi

    Abstract: Attack Trees (AT) are a popular formalism for security analysis. They are meant to display an attacker's goal decomposed into attack steps needed to achieve it and compute certain security metrics (e.g., attack cost, probability, and damage). ATs offer three important services: (a) conceptual modeling capabilities for representing security risk management scenarios, (b) a qualitative assessment to… ▽ More

    Submitted 30 June, 2025; originally announced June 2025.

  2. arXiv:2506.23789  [pdf

    cs.LO

    Querying Attack-Fault-Defense Trees: Property Specification in Smart Grid and Aerospace Case Studies

    Authors: Reza Soltani, Stefano M. Nicoletti, Milan Lopuhaä-Zwakenberg, Mariëlle Stoelinga

    Abstract: This paper introduces AFDL, a logic-based framework for reasoning about safety, security, and defense interactions in Attack-Fault-Defense Trees, which is a model that captures all safety, security, and defense domains in a single framework. We showcase both AFDL and propose a structured domain specific query language, LangAFDL, which enables domain experts to express complex analysis goals throug… ▽ More

    Submitted 30 July, 2025; v1 submitted 30 June, 2025; originally announced June 2025.

  3. arXiv:2506.23773  [pdf

    cs.AI cs.LO

    BayesL: Towards a Logical Framework for Bayesian Networks

    Authors: Stefano M. Nicoletti, Mariëlle Stoelinga

    Abstract: We introduce BayesL, a novel logical framework for specifying, querying, and verifying the behaviour of Bayesian networks (BNs). BayesL (pronounced "Basil") is a structured language that allows for the creation of queries over BNs. It facilitates versatile reasoning concerning causal and evidence-based relationships, and permits comprehensive what-if scenario evaluations without the need for manua… ▽ More

    Submitted 30 June, 2025; originally announced June 2025.

  4. WATCHDOG: an ontology-aWare risk AssessmenT approaCH via object-oriented DisruptiOn Graphs

    Authors: Stefano M. Nicoletti, E. Moritz Hahn, Mattia Fumagalli, Giancarlo Guizzardi, Mariëlle Stoelinga

    Abstract: When considering risky events or actions, we must not downplay the role of involved objects: a charged battery in our phone averts the risk of being stranded in the desert after a flat tyre, and a functional firewall mitigates the risk of a hacker intruding the network. The Common Ontology of Value and Risk (COVER) highlights how the role of objects and their relationships remains pivotal to perfo… ▽ More

    Submitted 30 June, 2025; v1 submitted 18 December, 2024; originally announced December 2024.

    Journal ref: (2025). WATCHDOG: an ontology-aWare risk AssessmenT approaCH via object-oriented DisruptiOn Graphs. In: Krogstie, J., Rinderle-Ma, S., Kappel, G., Proper, H.A. (eds) Advanced Information Systems Engineering. CAiSE 2025

  5. arXiv:2410.06692  [pdf

    cs.CR cs.LO

    How hard can it be? Quantifying MITRE attack campaigns with attack trees and cATM logic

    Authors: Stefano M. Nicoletti, Milan Lopuhaä-Zwakenberg, Mariëlle Stoelinga, Fabio Massacci, Carlos E. Budde

    Abstract: The landscape of cyber threats grows more complex by the day. Advanced Persistent Threats carry out attack campaigns - e.g. operations Dream Job, Wocao, and WannaCry - against which cybersecurity practitioners must defend. To prioritise which of these to defend against, cybersecurity experts must be equipped with the right toolbox to evaluate the most threatening ones. In particular, they would st… ▽ More

    Submitted 10 December, 2024; v1 submitted 9 October, 2024; originally announced October 2024.

  6. arXiv:2401.16015  [pdf

    cs.LO

    Querying Fault and Attack Trees: Property Specification on a Water Network

    Authors: Stefano M. Nicoletti, Milan Lopuhaä-Zwakenberg, E. Moritz Hahn, Mariëlle Stoelinga

    Abstract: We provide an overview of three different query languages whose objective is to specify properties on the highly popular formalisms of fault trees (FTs) and attack trees (ATs). These are BFL, a Boolean Logic for FTs, PFL, a probabilistic extension of BFL and ATM, a logic for security metrics on ATs. We validate the framework composed by these three logics by applying them to the case study of a wa… ▽ More

    Submitted 29 January, 2024; originally announced January 2024.

  7. Considerations on Approaches and Metrics in Automated Theorem Generation/Finding in Geometry

    Authors: Pedro Quaresma, Pierluigi Graziani, Stefano M. Nicoletti

    Abstract: The pursue of what are properties that can be identified to permit an automated reasoning program to generate and find new and interesting theorems is an interesting research goal (pun intended). The automatic discovery of new theorems is a goal in itself, and it has been addressed in specific areas, with different methods. The separation of the "weeds", uninteresting, trivial facts, from the "whe… ▽ More

    Submitted 22 January, 2024; originally announced January 2024.

    Comments: In Proceedings ADG 2023, arXiv:2401.10725

    ACM Class: I.2.3; F4

    Journal ref: EPTCS 398, 2024, pp. 85-100

  8. arXiv:2309.09231  [pdf

    cs.CR cs.LO

    ATM: a Logic for Quantitative Security Properties on Attack Trees

    Authors: Stefano M. Nicoletti, Milan Lopuhaä-Zwakenberg, E. Moritz Hahn, Mariëlle Stoelinga

    Abstract: Critical infrastructure systems - for which high reliability and availability are paramount - must operate securely. Attack trees (ATs) are hierarchical diagrams that offer a flexible modelling language used to assess how systems can be attacked. ATs are widely employed both in industry and academia but - in spite of their popularity - little work has been done to give practitioners instruments to… ▽ More

    Submitted 17 May, 2024; v1 submitted 17 September, 2023; originally announced September 2023.

  9. PFL: a Probabilistic Logic for Fault Trees

    Authors: Stefano M. Nicoletti, Milan Lopuhaä-Zwakenberg, E. Moritz Hahn, Mariëlle Stoelinga

    Abstract: Safety-critical infrastructures must operate in a safe and reliable way. Fault tree analysis is a widespread method used for risk assessment of these systems: fault trees (FTs) are required by, e.g., the Federal Aviation Administration and the Nuclear Regulatory Commission. In spite of their popularity, little work has been done on formulating structural queries about FT and analyzing these, e.g.,… ▽ More

    Submitted 4 August, 2025; v1 submitted 30 March, 2023; originally announced March 2023.

    Comments: arXiv admin note: text overlap with arXiv:2208.13424

    Journal ref: In: Chechik, M., Katoen, JP., Leucker, M. (eds) Formal Methods. FM 2023. Lecture Notes in Computer Science, vol 14000. Springer, Cham

  10. BFL: a Logic to Reason about Fault Trees

    Authors: Stefano M. Nicoletti, E. Moritz Hahn, Marielle Stoelinga

    Abstract: Safety-critical infrastructures must operate safely and reliably. Fault tree analysis is a widespread method used to assess risks in these systems: fault trees (FTs) are required - among others - by the Federal Aviation Authority, the Nuclear Regulatory Commission, in the ISO26262 standard for autonomous driving and for software development in aerospace systems. Although popular both in industry a… ▽ More

    Submitted 1 June, 2024; v1 submitted 29 August, 2022; originally announced August 2022.

  11. arXiv:2106.06272  [pdf

    cs.CR

    Model-based Joint Analysis of Safety and Security: Survey and Identification of Gaps

    Authors: Stefano M. Nicoletti, Marijn Peppelman, Christina Kolb, Mariëlle Stoelinga

    Abstract: We survey the state-of-the-art on model-based formalisms for safety and security joint analysis, where safety refers to the absence of unintended failures, and security to absence of malicious attacks. We conduct a thorough literature review and - as a result - we consider fourteen model-based formalisms and compare them with respect to several criteria: (1) Modelling capabilities and Expressivene… ▽ More

    Submitted 23 October, 2023; v1 submitted 11 June, 2021; originally announced June 2021.