Assessing the Understandability of Attack-Defense Trees for Modelling Security Requirements: an Experimental InvestigationScientific evaluation
Context and Motivation: Attack-Defense Trees (ADTs) are a graphical notation used to model and assess security requirements. ADTs are widely popular, as they can facilitate communication between different stakeholders involved in system security evaluation, and they are formal enough to be verified, e.g., with model checkers. Question/Problem: While the quality of this notation has been primarily assessed quantitatively, its understandability has never been evaluated, despite being mentioned as a key factor for its success. Principal idea/Results: In this paper, we conduct an experiment with human subjects to assess the understandability and user acceptance of the ADT notation. The study focuses on performance-based variables and perception-based variables, with the aim of evaluating the relationship between these measures and how they might impact the practical use of the notation. The results confirm the general understandability of ADTs, as well as the intention to use them. Contribution: This is the first study that empirically confirms the understandability of ADTs, thereby contributing to theory in security requirements engineering.
Assessing the Understandability of Attack-Defense Trees for Modelling Security Requirements: an Experimental Investigation (Attack_Defense_Tree_Comprehensibility_Study___REFSQ__proceedings_.pdf) | 905KiB |
Tue 9 AprDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
16:00 - 17:30 | Quality Requirements (R6)Research Track at Vorhangsaal Conference room MA-E0.46 Chair(s): Emilio Insfran Universitat Politècnica de València, Spain | ||
16:00 40mTalk | Assessing the Understandability of Attack-Defense Trees for Modelling Security Requirements: an Experimental InvestigationScientific evaluation Research Track P: Giovanna Broccia ISTI-CNR, FMT Lab, A: Maurice ter Beek ISTI-CNR, Pisa, Italy, A: Alberto Lluch Lafuente Technical University of Denmark, A: Paola Spoletini Kennesaw State University, A: Alessio Ferrari CNR-ISTI, D: Guntur Budi Herwanto Universitas Gadjah Mada File Attached | ||
16:40 40mTalk | Learning to Rank Privacy Design Patterns: A Semantic Approach to Meeting Privacy RequirementsTechnical design Research Track P: Guntur Budi Herwanto Universitas Gadjah Mada, A: Gerald Quirchmayr University of Vienna, A: A Min Tjoa Faculty of Informatics, TU Wien, D: Giovanna Broccia ISTI-CNR, FMT Lab |