% Authors : Barbara Kordy (barbara.kordy@uni.lu)
%           Patrick Schweitzer (patrick.schweitzer@uni.lu)
% Date : 25/06/2012
% (c) 2012 University of Luxembourg - Interdisciplinary Centre for Security 
% Reliability and Trust (SnT)
% All rights reserved

\documentclass{article}

\usepackage{ADT_web}
\usepackage[labelformat=empty]{caption}
\pagestyle{empty}

%------------------------------------------------------------------------------
\begin{document}

\begin{figure}[htb]
\centering
\psset{treesep=0.5cm}
\psscalebox{0.66}{
\pstree[levelsep=58pt,treesep=0.5cm]{\NodeA{Bank\\ Account}}
{\pstree{\NNodeA{ATM}{ATM}}{
\pstree{\NNodeA{PIN}{PIN}}{
\NodeA{Eavesdrop}
\pstree{\NodeA{Find Note}}{
\NodeBC{Memorize}}
\NodeA{Force}
}
\NNodeA{Card}{Card}}
\pstree{ 
\NNodeA{Online}{Online}}{
\pstree{\NNodeA{Password}{Password}}{
\NodeA{Phishing}
\NodeA{Key\\ Logger}
}
\NNodeA{User}{User Name}
\pstree{\NodeBC{2nd Auth\\ Factor}}{
\NodeB{Key Fobs}
\NodeB{PIN Pad}
\pstree{\NodeAC{Malware}}{
\NodeA{Browser}
\NodeA{OS}}}
\Arc{ATM}{PIN}{Card}
\Arclhs{Online}{Password}{User}
}
}
%Legend
\rput(-1.5,0){
  \begin{tabular}{|cl|}
  \hline
  \hspace{1ex}$\ACC$ & attack node\\
  \hspace{1ex}$\DCC$ & defense node\\
  \hspace{2ex}\psline[linewidth=0.5pt](0,.3)(-.3,0)
    \psline[linewidth=0.5pt](0,.3)(-.1,0)
    \psline[linewidth=0.5pt](0,.3)(.1,0)
    & disjunctive refinement\\
  \hspace{2ex}\psline[linewidth=0.5pt](0,.3)(-.3,0)
    \psline[linewidth=0.5pt](0,.3)(-.1,0)
    \psline[linewidth=0.5pt](0,.3)(.1,0)
    \psarc[linewidth=0.5pt](0,.3){0.2cm}{225}{288}
    & conjunctive refinement\\
  \hspace{1ex}\psline[linewidth=1pt,linestyle=dotted](0,.25)(0,-.05)
    & countermeasure\\
  \hline
  \end{tabular}
  }
}
\caption{How to steal money from a bank account?}
\label{fig:main}
\end{figure}
\end{document}