REFSQ 2024
Mon 8 - Thu 11 April 2024 Winterthur, Switzerland

Context and Motivation: Attack-Defense Trees (ADTs) are a graphical notation used to model and assess security requirements. ADTs are widely popular, as they can facilitate communication between different stakeholders involved in system security evaluation, and they are formal enough to be verified, e.g., with model checkers. Question/Problem: While the quality of this notation has been primarily assessed quantitatively, its understandability has never been evaluated, despite being mentioned as a key factor for its success. Principal idea/Results: In this paper, we conduct an experiment with human subjects to assess the understandability and user acceptance of the ADT notation. The study focuses on performance-based variables and perception-based variables, with the aim of evaluating the relationship between these measures and how they might impact the practical use of the notation. The results confirm the general understandability of ADTs, as well as the intention to use them. Contribution: This is the first study that empirically confirms the understandability of ADTs, thereby contributing to theory in security requirements engineering.

Assessing the Understandability of Attack-Defense Trees for Modelling Security Requirements: an Experimental Investigation (Attack_Defense_Tree_Comprehensibility_Study___REFSQ__proceedings_.pdf)905KiB

Tue 9 Apr

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

16:00 - 17:30
Quality Requirements (R6)Research Track at Vorhangsaal Conference room MA-E0.46
Chair(s): Emilio Insfran Universitat Politècnica de València, Spain
16:00
40m
Talk
Assessing the Understandability of Attack-Defense Trees for Modelling Security Requirements: an Experimental InvestigationScientific evaluationBest Paper Candidate
Research Track
P: Giovanna Broccia ISTI-CNR, FMT Lab, A: Maurice ter Beek ISTI-CNR, Pisa, Italy, A: Alberto Lluch Lafuente Technical University of Denmark, A: Paola Spoletini Kennesaw State University, A: Alessio Ferrari CNR-ISTI, D: Guntur Budi Herwanto Universitas Gadjah Mada
File Attached
16:40
40m
Talk
Learning to Rank Privacy Design Patterns: A Semantic Approach to Meeting Privacy RequirementsTechnical design
Research Track
P: Guntur Budi Herwanto Universitas Gadjah Mada, A: Gerald Quirchmayr University of Vienna, A: A Min Tjoa Faculty of Informatics, TU Wien, D: Giovanna Broccia ISTI-CNR, FMT Lab