GraMSec 2015

The Second International Workshop on
Graphical Models for Security

Verona, Italy - July 13, 2015

Co-located with CSF 2015



Graphical security models provide an intuitive but systematic methodology to analyze security weaknesses of systems and to evaluate potential protection measures. Formal methods and computer security researchers, as well as security professionals from industry and government, have proposed various graphical security modeling schemes. Such models are used to capture different security facets (digital, physical, and social) and address a range of challenges including security assessment, risk analysis, automated defensing, secure services composition, policy validation and verification. The objective of GraMSec is to contribute to the development of well-founded graphical security models, efficient algorithms for their analysis, as well as methodologies for their practical usage.


The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of graphical models for security. The topics of the workshop include, but are not limited to:

  • Attack trees, attack graphs, and their variants
  • Petri nets, Markov chains, and Bayesian networks for security
  • UML-based models and other graphical modeling approaches for security
  • Enhancement and/or optimization of existing graphical security models
  • Methods for (semi-)automatic generation of graphical security models
  • Scalability of graphical security models
  • Software tools for graphical security modeling and analysis
  • Risk assessment and risk management using graphical security models
  • Methods for quantitative analysis of graphical security models
  • Formal semantics of graphical security models
  • Formal verification of graphical security models
  • Game theoretical approaches to graphical security models
  • Visualization of system security
  • Visual security modeling and analysis of socio-technical and cyber-physical systems
  • Graphical models for system, organizational, and business security
  • Graphical security models for emerging paradigms (e.g., Cloud computing, IoT, Software Defined Networks, Big Data)
  • Case studies and experience reports on the use of graphical security modeling paradigm.


  • Submission deadline: April 30
  • Acceptance notification: June 9
  • Camera ready version: June 25
  • Workshop: July 13


Marc Bouissou, Professor at École Centrale Paris and a Senior Research Engineer at EDF R&D, France


Sushil Jajodia, George Mason University, USA


Sjouke Mauw, University of Luxembourg, LU

Barbara Kordy, INSA Rennes, IRISA, FR


Ravi Jhawar, University of Luxembourg, LU


Piotr Kordy, University of Birmingham, UK


For inquiries please send an e-mail to

logo GMU     logo UL    logo INSA logo IRISA logo TREsPASS