GraMSec 2016

The Third International Workshop on
Graphical Models for Security

Lisbon, Portugal - June 27, 2016

Co-located with CSF 2016

GraMSec'16 post-proceedings are available online



Graphical security models provide an intuitive but systematic methodology to analyze security weaknesses of systems and to evaluate potential protection measures. Formal methods and computer security researchers, as well as security professionals from industry and government, have proposed various graphical security modeling schemes. Such models are used to capture different security facets (digital, physical, and social) and address a range of challenges including security assessment, risk analysis, automated defensing, secure services composition, policy validation and verification. The objective of GraMSec is to contribute to the development of well-founded graphical security models, efficient algorithms for their analysis, as well as methodologies for their practical usage.


The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of graphical models for security. The topics of the workshop include, but are not limited to:

  • Graphical models for threat modeling and analysis
  • Graphical models for risk analysis and management
  • Graphical models for requirements analysis and management
  • Textual and graphical representation for system, organizational, and business security
  • Visual security modeling and analysis of socio-technical and cyber-physical systems
  • Graphical security modeling for cyber situational awareness
  • Graphical models supporting the security by design paradigm
  • Methods for quantitative and qualitative analysis of graphical security models
  • Formal semantics and verification of graphical security models
  • Methods for (semi-)automatic generation of graphical security models
  • Enhancement and/or optimization of existing graphical security models
  • Scalable evaluation of graphical security models
  • Evaluation algorithms for graphical security models
  • Dynamic update of graphical security models
  • Game theoretical approaches to graphical security modeling
  • Attack trees, attack graphs and their variants
  • Stochastic Petri nets, Markov chains, and Bayesian networks for security
  • UML-based models and other graphical modeling approaches for security
  • Software tools for graphical security modeling and analysis
  • Case studies and experience reports on the use of graphical security modeling paradigm.


  • Submission deadline: April 18 April 24 - 23:59 CET (extended, firm)
  • Acceptance notification: May 20
  • Workshop: June 27
  • Camera ready version for Springer post-proceedings: July 15


Xinming Ou, Associate Professor at Computer Science and Engineering, University of South Florida, USA


Barbara Kordy, INSA Rennes, IRISA, France


Mathias Ekstedt, KTH Royal Institute of Technology, Sweden

Dong Seong Kim, University of Canterbury, New Zealand


Piotr Kordy, University of Luxembourg, Luxembourg


For inquiries please send an e-mail to

logo KTH        logo INSA logo IRISA logo UL logo TREsPASS