Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees

Dov M. Gabbay, Ross Horne, Sjouke Mauw, Leendert van der Torre

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations


This position paper connects the areas and communities of abstract argumentation and attack-defence trees in the area of security. Both areas deal with attacks, defence and support and both areas rely on applications dealing with human aggressive activities. The unifying idea we use in this paper is to regard arguments as AND-OR attack trees as proposed by Schneier in the security domain. The core model, which is acceptable for both communities, is a pair where S is a set of attack trees (the “arguments”) and is a binary relation on attack trees (the “attack” relation). This leads us to the notion of an attack-defence framework, which provides an argumentation-based semantics for attack-defence trees and more general attack-defence graphs.

Original languageEnglish
Title of host publicationGraphical Models for Security - 7th International Workshop, GraMSec 2020, Revised Selected Papers
EditorsHarley Eades III, Olga Gadyatskaya
PublisherSpringer Science and Business Media Deutschland GmbH
Number of pages23
ISBN (Print)9783030622299
StatePublished - 2020
Externally publishedYes
Event7th International Workshop on Graphical Models for Security, GramSec 2020 - Boston, United States
Duration: 22 Jun 202022 Jun 2020

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume12419 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference7th International Workshop on Graphical Models for Security, GramSec 2020
Country/TerritoryUnited States

Bibliographical note

Publisher Copyright:
© 2020, Springer Nature Switzerland AG.


Dive into the research topics of 'Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees'. Together they form a unique fingerprint.

Cite this