The following links provide access to movies that show behaviors found by
our testing system for attackers successful in breaking harbour security
policies. For more
information, especially descriptions of the behaviors shown, please read
our technical report. The attackers are indicated by the pirate flag.
Attack strategy found by base goal ordering structure (Figure 4
in report) |
Attack strategy found by hideafter goal ordering structure (Figure 5
in report) |
Attack strategy found by hsumafter goal ordering structure (Figure 6
in report) |
|
|
|
Attack strategy found by hidebefore goal ordering structure (Figure 7
in report) |
Attack strategy found by hsumbefore goal ordering structure (Figure 8
in report) |
|
|
|
|
Successful attack strategy despite an attacker crashing (Figure 9
in report) |
Attack that creates collision between defenders (Figure 10 in
report) |
|
|
|
|