Permalink
Showing
with
591 additions
and 70 deletions.
- BIN images/aadlModel.png
- BIN images/aadl_security_framework.png
- BIN images/accessModeGroupExample.png
- BIN images/attackAnalysis.png
- BIN images/attackAnalysisZoom.png
- BIN images/authenticationExample.png
- BIN images/encrypted_transmitter.png
- BIN images/encrypted_transmitter_sidebyside.png
- BIN images/encryptionExample.png
- BIN images/recursivePBD.png
- BIN images/resoluteExample.png
- BIN images/securityLevelsExample.png
- +25 −6 sig-alternate-sample.aux
- +431 −56 sig-alternate-sample.log
- BIN sig-alternate-sample.pdf
- BIN sig-alternate-sample.synctex.gz
- +135 −8 sig-alternate-sample.tex
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
@@ -1,10 +1,29 @@ | ||
\relax | ||
\select@language{english} | ||
\@writefile{toc}{\select@language{english}} | ||
\@writefile{lof}{\select@language{english}} | ||
\@writefile{lot}{\select@language{english}} | ||
\@writefile{toc}{\contentsline {section}{\numberline {1}Introduction}{\thepage }} | ||
\@writefile{toc}{\contentsline {section}{\numberline {2}Related Work}{\thepage }} | ||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.1}Modeling}{\thepage }} | ||
\@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces Visualization of Security Design Framework}}{\thepage }} | ||
\newlabel{fig:AADLSecFrame}{{1}{\thepage }} | ||
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2}Defining Risk}{\thepage }} | ||
\@writefile{toc}{\contentsline {section}{\numberline {3}General System Modeling}{\thepage }} | ||
\@writefile{toc}{\contentsline {section}{\numberline {4}Defining Risk}{\thepage }} | ||
\@writefile{toc}{\contentsline {section}{\numberline {5}Design Oriented Examination of Risk}{\thepage }} | ||
\@writefile{toc}{\contentsline {section}{\numberline {6}Scenario Examination}{\thepage }} | ||
\@writefile{toc}{\contentsline {section}{\numberline {7}Modeling an Attacker}{\thepage }} | ||
\@writefile{toc}{\contentsline {section}{\numberline {8}Expanding Considerations}{\thepage }} | ||
\@writefile{toc}{\contentsline {section}{\numberline {9}Conclusion}{\thepage }} | ||
\@writefile{toc}{\contentsline {section}{\numberline {4}Design Oriented Examination of Risk}{\thepage }} | ||
\@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces Illustrative Example of Attack Vector Tree}}{\thepage }} | ||
\newlabel{fig:attackTree}{{2}{\thepage }} | ||
\@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Estimation of Attack Risk Behavior}}{\thepage }} | ||
\newlabel{fig:attackRisk}{{3}{\thepage }} | ||
\@writefile{toc}{\contentsline {section}{\numberline {5}Scenario Examination}{\thepage }} | ||
\@writefile{toc}{\contentsline {section}{\numberline {6}Modeling an Attacker}{\thepage }} | ||
\@writefile{lof}{\contentsline {figure}{\numberline {4}{\ignorespaces Design Implementations of Wireless Transmitter}}{\thepage }} | ||
\newlabel{fig:exampleDesigns}{{4}{\thepage }} | ||
\@writefile{lot}{\contentsline {table}{\numberline {1}{\ignorespaces Table of Individual Part Costs}}{\thepage }} | ||
\newlabel{tbl:partCosts}{{1}{\thepage }} | ||
\@writefile{lot}{\contentsline {table}{\numberline {2}{\ignorespaces Calculated Values for Wireless Transmitter Example}}{\thepage }} | ||
\newlabel{tbl:calculations}{{2}{\thepage }} | ||
\@writefile{toc}{\contentsline {section}{\numberline {7}Expanding Considerations}{\thepage }} | ||
\@writefile{toc}{\contentsline {section}{\numberline {8}Conclusion}{\thepage }} | ||
\@writefile{lof}{\contentsline {figure}{\numberline {5}{\ignorespaces Comparison of Impact as a Function of Security Risk for Design \#1}}{\thepage }} | ||
\newlabel{fig:SRvI}{{5}{\thepage }} |

Oops, something went wrong.