8:40 – 8:45 OPENING
8:45 – 10:00 INVITED TALK
-
Dr. Anoop Singhal, NIST
Security Metrics and Risk Analysis for Enterprise Systems
10:00 – 10:35 BREAK (eclipse + coffee)
10:35 – 12:35 SESSION 1: Security Modeling
-
10:35 – 11:15 (regular paper)
Dan Ionita, Margaret Ford, Alexandr Vasenev, and Roel Wieringa
Graphical Modeling of Security Arguments: Current State and Future Directions -
11:15 – 11:35 (short paper)
Brian Ruttenberg, Dave Blumstein, Jeff Druce, Michael Howard, Fred Reed, Leslie Wilfong, Crystal Lister, Steve Gaskin, Meaghan Foley, and Dan Scofield
Probabilistic Modeling of Insider Threat Detection Systems -
11:35 – 12:15 (regular paper)
Angèle Bossuat and Barbara Kordy
Evil Twins: Handling Repetitions in Attack–Defense Trees - A Survival Guide -
12:15 – 12:35 (short paper)
Letitia Li, Florian Lugou, and Ludovic Apvrille
Security Modeling for Embedded System Design
12:40 – 14:00 LUNCH
14:00 – 15:40 SESSION 2: Risk Analysis
-
14:00 – 14:40 (regular paper)
Karin Bernsmed, Christian Frøystad, Per Håkon Meland, Dag Atle Nesheim, and Ørnulf Jan Rødseth
Visualizing Cyber Security Risks with Bow-Tie Diagrams -
14:40 – 15:20 (regular paper)
Aitor Couce-Vieira, Siv Hilde Houmb, and David Ríos-Insua
CSIRA: A Method for Analysing the Risk of Cybersecurity Incidents -
15:20 – 15:40 (short paper)
Ryan Habibi, Jens Weber, and Morgan Price
Circle of Health Based Access Control for Personal Health Information Systems
15:40 – 16:10 BREAK
16:10 – 17:10 SESSION 3: Attack Trees
-
16:10 – 16:50 (regular paper)
Peter Gjøl Jensen, Axel Legay, Kim Guldstrand Larsen, and Danny Bøgsted Poulsen
Quantitative Evaluation of Attack Defense Trees using Stochastic Timed Automata -
16:50 – 17:10 (short paper)
Olga Gadyatskaya and Rolando Trujillo-Rasua
New Directions in Attack Tree Research: Catching up with Industrial Needs