PROGRAM
GraMSec 2020 - Program.pdfGraMSec 2020 pre-recorded videos of the presentations are available in this YouTube Playlist.
Time zones: US Eastern Daylight Saving Time (EDT) time indicated; Central European Summer Time (CEST) time in parentheses.
9:00 – 9:15 (15:00 - 15:15) Start and Welcoming remarks
9:15 – 10:00 (15:15 - 16:00) KEYNOTE (slides) from Marielle Stoelinga
Chair Olga Gadyatskaya
10:00 – 10:10 (16:00 - 16:10) BREAK
10:10 – 11:10 (16:10 - 17:10) SESSION 1: Attack trees
Chair Harley D. Eades III
-
Amjad Ibrahim, Simon Rehwald, Antoine Scemama, Florian Andres and Alexander Pretschner
Causal model extraction from attack trees to attribute malicious insiders attacks (slides) -
Sophie Pinchinat, Francois Schwarzentruber and Sébastien Lê Cong
Library-based attack tree synthesis (slides) -
Christopher Schmitz, André Sekulla and Sebastian Pape
Asset-centric analysis and visualisation of attack trees
11:10 – 11:30 (17:10 - 17:30) BREAK
11:30 – 12:40 (17:30 - 18:40) SESSION 2: Attacks and risks modeling and visualisation
Chair Barbara Fila
-
Sotirios Katsikeas, Simon Hacks, Pontus Johnson, Mathias Ekstedt, Robert Lagerström, Joar Jacobsson, Max Wällstedt and Per Eliasson
A probabilistic attack simulation language for the IT domain -
Adam Szekeres and Einar Snekkenes
Representing decision-makers in SGAM-H: The smart grid architecture model extended with the human layer (slides) -
Kristian Haga, Per Håkon Meland and Guttorm Sindre
Breaking the cyber kill chain by modelling resource costs (slides) (short paper) -
Jean-Francois Lalande, Mathieu Simon and Valérie Viet Triem Tong
GroDDViewer: Dynamic dual view of Android malware (slides) (short paper)
12:40 – 13:00 (18:40 - 19:00) BREAK
13:00 – 13:55 (19:00 - 19:55) SESSION 3: Models for reasoning about security
Chair Marielle Stoelinga
-
Dov Gabbay, Ross Horne, Sjouke Mauw and Leon van der Torre
Argumentation-based semantics for attack-defense networks -
Peter Hines
A diagrammatic approach to information flow in encrypted communication (slides) -
Shamal Faily, Riccardo Scandariato, Adam Shostack, Laurens Sion and Duncan Ki-Aries
Contextualisation of data flow diagrams for security analysis (short paper)