This paper introduces H-Verify, a platform to design and implement intrusions against real-world ICT infrastructures. Unique in its approach, H-Verify leverages adversary simulations previously ran on a digital twin of the target infrastructure to fully or partially automate the planning and execution of intrusions but it can also act as a flexible decision support system for the manual planning of intrusions. Furthermore, the tool also supports the simulation results, detecting false positives in the infrastructure vulnerabilities, testing applied countermeasures, and supporting users with distinct levels of experience in red teaming engagements.

H-Verify: Automating Intrusions through Digital Twins

Panti E.
Methodology
;
Isoni L.
Validation
;
Baiardi F.
Supervision
2024-01-01

Abstract

This paper introduces H-Verify, a platform to design and implement intrusions against real-world ICT infrastructures. Unique in its approach, H-Verify leverages adversary simulations previously ran on a digital twin of the target infrastructure to fully or partially automate the planning and execution of intrusions but it can also act as a flexible decision support system for the manual planning of intrusions. Furthermore, the tool also supports the simulation results, detecting false positives in the infrastructure vulnerabilities, testing applied countermeasures, and supporting users with distinct levels of experience in red teaming engagements.
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11568/1280247
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact