Automated generation and evaluation of attack trees
2025-2026/II.
Dr. Buttyán Levente
Attack trees are used to describe and analyze possible ways to attack a system. Generating them can be a tedious work if done manually, so we would like to automate the process. In addition, attack trees generated by automated tools tend to be very large, so we would like to automate their analysis too, and we would like to support system designers to better understand the threats and critical components of their system by allowing them to discuss with an LLM agent that takes as input the attack tree and its analysis results.
1
1