Zugehörige Institution(en) am KIT | Institut für Informationssicherheit und Verlässlichkeit (KASTEL) Institut für Programmstrukturen und Datenorganisation (IPD) |
Publikationstyp | Forschungsdaten |
Publikationsdatum | 10.01.2022 |
Erstellungsdatum | 01.01.2022 |
Identifikator | DOI: 10.5445/IR/1000141655 KITopen-ID: 1000141655 |
HGF-Programm | 46.23.03 (POF IV, LK 01) Engineering Security for Mobility Systems |
Lizenz | Eclipse Public License 2.0 |
Liesmich | Dataset for Attacker PropagationContentThere are 4 folders:
Executing with the binaryWe bundled a eclipse product, which can be used to start our analysis and view the models. It should be configured that it automatically opens a workspace with the necessary projects loaded. In case that won't happen, the projects can be manually loaded over the source folder and there Palladio-Addons-ContextConfidentiality-Analysis/tests/org.palladiosimulator.pcm.confidentiality.context.analysis.testmodels/ or for the automatic test Palladio-Addons-ContextConfidentiality-Analysis/tests/edu.kit.ipd.sdq.kamp4attack.tests/
Executing without the binaries
Model Descripton
ResultsmodelThe ids of the non pcm elements (ServiceRestrictions and CompromisedData) might change for every run, since they are dynamically calculated for each analysis step. However, this is not problematic since they can identified by their other properties. Further InformationAdditional information and the current source code can be found at our Github repositories: |
Art der Forschungsdaten | Dataset |
Relationen in KITopen |
|