Information flow integrity measurement method using integrity threat tree
In order to avert the Recycle-Appliance drawback of traditional information flow integrity analysis on ignoring the specific system architecture and associated attack events, an integrity threat tree to quantify the integrity of the system information flow, and the conditional trigger gate to model the associated attack events were proposed.The att