8:30 – 8:50 REGISTRATION
8:50 – 9:00 WELCOME
9:00 – 10:00 INVITED TALK
Chair Mathias Ekstedt
-
Prof. Xinming Ou, University of South Florida, USA
A Bottom-up Approach to Applying Graphical Models in Security Analysis (slides)
10:00 – 10:30 COFEE BREAK
10:30 – 12:00 SESSION 1: Security Assessment
Chair Sjouke Mauw
-
Eric Li, Jeroen Barendse, Frederic Brodbeck and Axel Tanner
From A to Z: Developing a Visual Vocabulary for Information Security Threat Visualisation -
Xinshu Dong, Sumeet Jauhar, William G. Temple, Binbin Chen, Zbigniew Kalbarczyk, William H. Sanders, Nils Ole Tippenhauer and David M. Nicol.
The Right Tool for the Job: a Case for Common Input Scenarios for Security Assessment -
Henk Jonkers and Dick Quartel.
Enterprise Architecture-Based Risk and Security Modelling and Analysis
12:15 – 14:00 LUNCH
14:00 – 15:30 SESSION 2: Attack Trees and Foundamentals
Chair David Pym
-
Maxime Audinot and Sophie Pinchinat.
On the Soundness of Attack Trees -
Nihal Pekergin, Sovanna Tan and Jean-Michel Fourneau.
Quantitative Attack Tree Analysis: Stochastic Bounds and Numerical Analysis -
Olga Gadyatskaya, Carlo Harpes, Sjouke Mauw, Cedric Muller and Steve Muller.
Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees
15:30 – 16:00 COFEE BREAK
16:00 – 17:30 SESSION 3: Application Domains of Graphical Models for Security
Chair Jean Leneutre
-
Marlon Dumas, Luciano García-Bañuelos and Peeter Laud.
Differential Privacy Analysis of Data Processing Workflows -
Ricardo J. Rodríguez, Xiaolin Chang, Xiaodan Li and Kishor S. Trivedi.
Survivability Analysis of a Computer System under an Advanced Persistent Threat Attack -
Paul Rowe.
Confining Adversary Actions via Measurement
20:00 – 23:00 DINNER at Restaurante Pharmacia
-
Informal dinner for the participants of the workshop
Restaurante Pharmacia
Rua Marechal Saldanha, 2
Santa Catarina district
Lisbon
Take the Azul line from São Sebastião and get off at Baxia-Chiado.