{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T13:52:04Z","timestamp":1750859524020},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030365363"},{"type":"electronic","value":"9783030365370"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-36537-0_6","type":"book-chapter","created":{"date-parts":[[2019,11,26]],"date-time":"2019-11-26T23:46:17Z","timestamp":1574811977000},"page":"95-125","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Attack\u2013Defense Trees for Abusing Optical Power Meters: A Case Study and the OSEAD Tool Experience Report"],"prefix":"10.1007","author":[{"given":"Barbara","family":"Fila","sequence":"first","affiliation":[]},{"given":"Wojciech","family":"Wide\u0142","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,28]]},"reference":[{"key":"6_CR1","unstructured":"ANSSI: La M\u00e9thode EBIOS Risk Manager (2018). \nhttps:\/\/www.ssi.gouv.fr\/guide\/la-methode-ebios-risk-manager-le-guide\/"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-642-40793-2_27","volume-title":"Computer Safety, Reliability, and Security","author":"F Arnold","year":"2013","unstructured":"Arnold, F., Belinfante, A., Van der Berg, F., Guck, D., Stoelinga, M.: DFTCalc: a tool for efficient fault tree analysis. In: Bitsch, F., Guiochet, J., Ka\u00e2niche, M. (eds.) SAFECOMP 2013. LNCS, vol. 8153, pp. 293\u2013301. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-40793-2_27"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-642-54792-8_16","volume-title":"Principles of Security and Trust","author":"F Arnold","year":"2014","unstructured":"Arnold, F., Hermanns, H., Pulungan, R., Stoelinga, M.: Time-dependent analysis of attacks. In: Abadi, M., Kremer, S. (eds.) POST 2014. LNCS, vol. 8414, pp. 285\u2013305. Springer, Heidelberg (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-642-54792-8_16"},{"key":"6_CR4","unstructured":"Aslanyan, Z.: TREsPASS toolbox: attack tree evaluator (2016). Presentation of a tool developed for the EU project TREsPASS. \nhttps:\/\/vimeo.com\/145070436\n\n. Accessed 16 Aug 2019"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-662-46666-7_6","volume-title":"Principles of Security and Trust","author":"Z Aslanyan","year":"2015","unstructured":"Aslanyan, Z., Nielson, F.: Pareto efficient solutions of attack-defence trees. In: Focardi, R., Myers, A. (eds.) POST 2015. LNCS, vol. 9036, pp. 95\u2013114. Springer, Heidelberg (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-662-46666-7_6"},{"issue":"2","key":"6_CR6","first-page":"1","volume":"3","author":"A Bagnato","year":"2012","unstructured":"Bagnato, A., Kordy, B., Meland, P.H., Schweitzer, P.: Attribute decoration of attack\u2013defense trees. IJSSE 3(2), 1\u201335 (2012)","journal-title":"IJSSE"},{"key":"6_CR7","unstructured":"Berkelaar, M., Eikland, K., Notebaert, P.: lp$$\\_$$solve: Open source (Mixed-Integer) Linear Programming system (2005). Version 5.5.2.5, dated 24 September 2016. \nhttp:\/\/lpsolve.sourceforge.net\/5.5\/\n\n. Accessed 04 Apr 2019"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-319-74860-3_2","volume-title":"Graphical Models for Security","author":"A Bossuat","year":"2018","unstructured":"Bossuat, A., Kordy, B.: Evil twins: handling repetitions in attack\u2013defense trees. In: Liu, P., Mauw, S., St\u00f8len, K. (eds.) GraMSec 2017. LNCS, vol. 10744, pp. 17\u201337. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-319-74860-3_2"},{"key":"6_CR9","unstructured":"Carpenter, M.: Advanced metering infrastructure attack methodology (2009). \nhttp:\/\/docshare.tips\/ami-attack-methodology_5849023fb6d87fd2bb8b4806.html\n\n. Accessed 20 Feb 2019"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"91","DOI":"10.4271\/11-01-02-0005","volume":"1","author":"J D\u00fcrrwang","year":"2018","unstructured":"D\u00fcrrwang, J., Braun, J., Rumez, M., Kriesten, R., Pretschner, A.: Enhancement of automotive penetration testing with threat analyses results. SAE Int. J. Cybersecurity 1, 91\u2013112 (2018). \nhttps:\/\/doi.org\/10.4271\/11-01-02-0005","journal-title":"SAE Int. J. Cybersecurity"},{"key":"6_CR11","unstructured":"EAC Advisory Board and Standards Board: Election Operations Assessment - Threat Trees and Matrices and Threat Instance Risk Analyzer (TIRA) (2009). \nhttps:\/\/www.eac.gov\/assets\/1\/28\/Election_Operations_Assessment_Threat_Trees_and_Matrices_and_Threat_Instance_Risk_Analyzer_(TIRA).pdf\n\n. Accessed 13 June 2018"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Edge, K.S., Dalton II, G.C., Raines, R.A., Mills, R.F.: Using attack and protection trees to analyze threats and defenses to homeland security. In: MILCOM, pp. 1\u20137. IEEE (2006)","DOI":"10.1109\/MILCOM.2006.302512"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Fila, B., Wide\u0142, W.: Efficient attack\u2013defense tree analysis using Pareto attribute domains. In: CSF, pp. 200\u2013215. IEEE Computer Society (2019)","DOI":"10.1109\/CSF.2019.00021"},{"key":"6_CR14","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-319-48393-1_24","volume-title":"The Practice of Enterprise Modeling","author":"M Fraile","year":"2016","unstructured":"Fraile, M., Ford, M., Gadyatskaya, O., Kumar, R., Stoelinga, M., Trujillo-Rasua, R.: Using attack-defense trees to analyze threats and countermeasures in an ATM: a case study. In: Horkoff, J., Jeusfeld, M.A., Persson, A. (eds.) PoEM 2016. LNBIP, vol. 267, pp. 326\u2013334. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-48393-1_24"},{"key":"6_CR15","unstructured":"Frederic Byumvuhore: FEATURED: REG steps up crackdown on electricity theft (2019). \nhttps:\/\/www.newtimes.co.rw\/news\/featured-reg-steps-crackdown-electricity-theft\n\n. Accessed 05 Apr 2019"},{"key":"6_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-319-44878-7_3","volume-title":"Formal Modeling and Analysis of Timed Systems","author":"O Gadyatskaya","year":"2016","unstructured":"Gadyatskaya, O., Hansen, R.R., Larsen, K.G., Legay, A., Olesen, M.C., Poulsen, D.B.: Modelling attack-defense trees using timed automata. In: Fr\u00e4nzle, M., Markey, N. (eds.) FORMATS 2016. LNCS, vol. 9884, pp. 35\u201350. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-44878-7_3"},{"key":"6_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-319-43425-4_10","volume-title":"Quantitative Evaluation of Systems","author":"O Gadyatskaya","year":"2016","unstructured":"Gadyatskaya, O., Jhawar, R., Kordy, P., Lounis, K., Mauw, S., Trujillo-Rasua, R.: Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0. In: Agha, G., Van Houdt, B. (eds.) QEST 2016. LNCS, vol. 9826, pp. 159\u2013162. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-43425-4_10"},{"key":"6_CR18","unstructured":"hashcat (2016). \nhttps:\/\/hashcat.net\/hashcat\/\n\n. Accessed 27 Mar 2019"},{"key":"6_CR19","unstructured":"Kelly-Detwiler, P.: Electricity theft: a bigger issue than you think (2013). \nhttps:\/\/www.forbes.com\/sites\/peterdetwiler\/2013\/04\/23\/electricity-theft-a-bigger-issue-than-you-think\/#5475872972ef\n\n. Accessed 20 Feb 2019"},{"key":"6_CR20","unstructured":"Wilburg, K.: GPL lost US\\$450M in 19 years to electricity theft, poor networks (2018). \nhttps:\/\/www.kaieteurnewsonline.com\/2018\/12\/10\/gpl-lost-us450m-in-19-years-to-electricity-theft-poor-networks\/\n\n. Accessed 05 Apr 2019"},{"issue":"1","key":"6_CR21","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1093\/logcom\/exs029","volume":"24","author":"B Kordy","year":"2014","unstructured":"Kordy, B., Mauw, S., Radomirovic, S., Schweitzer, P.: Attack\u2013defense trees. J. Log. Comput. 24(1), 55\u201387 (2014)","journal-title":"J. Log. Comput."},{"key":"6_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-642-37682-5_5","volume-title":"Information Security and Cryptology \u2013 ICISC 2012","author":"B Kordy","year":"2013","unstructured":"Kordy, B., Mauw, S., Schweitzer, P.: Quantitative questions on attack\u2013defense trees. In: Kwon, T., Lee, M.-K., Kwon, D. (eds.) ICISC 2012. LNCS, vol. 7839, pp. 49\u201364. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-37682-5_5"},{"key":"6_CR23","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.ins.2016.01.010","volume":"342","author":"B Kordy","year":"2016","unstructured":"Kordy, B., Pouly, M., Schweitzer, P.: Probabilistic reasoning with graphical security models. Inf. Sci. 342, 111\u2013131 (2016)","journal-title":"Inf. Sci."},{"key":"6_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-319-66845-1_22","volume-title":"Integrated Formal Methods","author":"B Kordy","year":"2017","unstructured":"Kordy, B., Wide\u0142, W.: How well can I secure my system? In: Polikarpova, N., Schneider, S. (eds.) IFM 2017. LNCS, vol. 10510, pp. 332\u2013347. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-66845-1_22"},{"key":"6_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-319-89722-6_14","volume-title":"Principles of Security and Trust","author":"B Kordy","year":"2018","unstructured":"Kordy, B., Wide\u0142, W.: On quantitative analysis of attack\u2013defense trees with repeated labels. In: Bauer, L., K\u00fcsters, R. (eds.) POST 2018. LNCS, vol. 10804, pp. 325\u2013346. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-319-89722-6_14"},{"key":"6_CR26","unstructured":"Krebs, B.: FBI: Smart Meter Hacks Likely to Spread (2012). \nhttps:\/\/krebsonsecurity.com\/2012\/04\/fbi-smart-meter-hacks-likely-to-spread\/\n\n. Accessed 20 Feb 2019"},{"key":"6_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-319-89363-1_4","volume-title":"Fundamental Approaches to Software Engineering","author":"R Kumar","year":"2018","unstructured":"Kumar, R., et al.: Effective analysis of attack trees: a model-driven approach. In: Russo, A., Sch\u00fcrr, A. (eds.) FASE 2018. LNCS, vol. 10802, pp. 56\u201373. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-319-89363-1_4"},{"key":"6_CR28","unstructured":"LLC, N.G.: World Loses \\$89.3 Billion to Electricity Theft Annually, \\$58.7 Billion in Emerging Markets (2014). \nhttps:\/\/www.prnewswire.com\/news-releases\/world-loses-893-billion-to-electricity-theft-annually-587-billion-in-emerging-markets-300006515.html\n\n. Accessed 20 Feb 2019"},{"key":"6_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12323-8","volume-title":"Model-Driven Risk Analysis: The CORAS Approach","author":"MS Lund","year":"2011","unstructured":"Lund, M.S., Solhaug, B., St\u00f8len, K.: Model-Driven Risk Analysis: The CORAS Approach. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-12323-8"},{"key":"6_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/11734727_17","volume-title":"Information Security and Cryptology - ICISC 2005","author":"S Mauw","year":"2006","unstructured":"Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 186\u2013198. Springer, Heidelberg (2006). \nhttps:\/\/doi.org\/10.1007\/11734727_17"},{"key":"6_CR31","unstructured":"McCullough, J.: Deterrent and detection of smart grid meter tampering and theft of electricity, water, or gas (2010). \nhttps:\/\/www.elstersolutions.com\/assets\/downloads\/WP42-1010A.pdf\n\n. Accessed 20 Feb 2019"},{"key":"6_CR32","unstructured":"Ms. Smith: FBI Warns Smart Meter Hacking May Cost Utility Companies \\$400 Million A Year (2012). \nhttps:\/\/www.csoonline.com\/article\/2222111\/fbi-warns-smart-meter-hacking-may-cost-utility-companies\u2013400-million-a-year.html\n\n. Accessed 05 Apr 2019"},{"key":"6_CR33","unstructured":"National Electric Sector Cybersecurity Organization Resource (NESCOR): Analysis of selected electric sector high risk failure scenarios, version 2.0 (2015). \nhttp:\/\/smartgrid.epri.com\/doc\/NESCOR%20Detailed%20Failure%20Scenarios%20v2.pdf"},{"key":"6_CR34","unstructured":"Ophcrack (2016). \nhttp:\/\/ophcrack.sourceforge.net\/\n\n. Accessed 17 Mar 2017"},{"key":"6_CR35","unstructured":"Ophcrack (2016). \nhttps:\/\/www.openwall.com\/john\/\n\n. Accessed 27 Mar 2019"},{"key":"6_CR36","unstructured":"adtrees Python package (2019). \nhttps:\/\/github.com\/wwidel\/adtrees\n\n. Accessed 05 Apr 2019"},{"key":"6_CR37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23570-7","volume-title":"Cyber-Risk Management","author":"A Refsdal","year":"2015","unstructured":"Refsdal, A., Solhaug, B., St\u00f8len, K.: Cyber-Risk Management. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-23570-7"},{"issue":"12","key":"6_CR38","first-page":"21","volume":"24","author":"B Schneier","year":"1999","unstructured":"Schneier, B.: Attack trees: modeling security threats. Dr. Dobb\u2019s J. Softw. Tools 24(12), 21\u201329 (1999)","journal-title":"Dr. Dobb\u2019s J. Softw. Tools"},{"key":"6_CR39","unstructured":"T&D World: India To Spend \\$21.6 Billion On Smart Grid Infrastructure By 2025 (2015). \nhttps:\/\/www.tdworld.com\/smart-grid\/india-spend-216-billion-smart-grid-infrastructure-2025\n\n. Accessed 05 Apr 2019"},{"key":"6_CR40","unstructured":"Weber, D.C.: Optiguard: A Smart Meter Assessment Toolkit (2012). \nhttps:\/\/media.blackhat.com\/bh-us-12\/Briefings\/Weber\/BH_US_12_Weber_Eye_of_the_Meter_WP.pdf\n\n. Accessed 20 Feb 2019"},{"issue":"4","key":"6_CR41","doi-asserted-by":"publisher","first-page":"75:1","DOI":"10.1145\/3331524","volume":"52","author":"W Wide\u0142","year":"2019","unstructured":"Wide\u0142, W., Audinot, M., Fila, B., Pinchinat, S.: Beyond 2014: formal methods for attack tree-based security modeling. ACM Comput. Surv. 52(4), 75:1\u201375:36 (2019). \nhttps:\/\/doi.org\/10.1145\/3331524","journal-title":"ACM Comput. Surv."}],"container-title":["Lecture Notes in Computer Science","Graphical Models for Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-36537-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,26]],"date-time":"2019-11-26T23:50:10Z","timestamp":1574812210000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-36537-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030365363","9783030365370"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-36537-0_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"28 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GraMSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Graphical Models for Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hoboken, NJ","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gramsec2019a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/gramsec.uni.lu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}