Knodel, J. and Naab, M. (2016). Pragmatic Evaluation of
Software Architectures. The Fraunhofer IESE Series
on Software and Systems Engineering. Springer Inter-
national Publishing, Cham and s.l.
Kordy, B., Pi
`
etre-Cambac
´
ed
`
es, L., and Schweitzer, P.
(2014). Dag-based attack and defense modeling: Dont
miss the forest for the attack trees. Computer science
review, 13:1–38.
Lano, K. and Kolahdouz-Rahimi, S. (2014). Model-
transformation design patterns. IEEE Trans. Software
Eng., 40(12):1224–1259.
Li, T., Paja, E., Mylopoulos, J., Horkoff, J., and Beckers, K.
(2016). Security attack analysis using attack patterns.
In IEEE 10th International Conference on Research
Challenges in Information Science, pages 1–13. IEEE.
Lo, D., Khoo, S.-C., and Liu, C. (2007). Efficient mining
of iterative patterns for software specification discov-
ery. In 13th ACM SIGKDD International Conference
on Knowledge discovery and data mining, pages 460–
469. ACM.
Lund, M. S., Solhaug, B., and Stølen, K. (2011). A guided
tour of the coras method. In Model-Driven Risk Anal-
ysis, pages 23–43. Springer.
Marinescu, R., Kaijser, H., Miku
ˇ
cionis, M., Seceleanu, C.,
L
¨
onn, H., and David, A. (2014). Analyzing indus-
trial architectural models by simulation and model-
checking. In International Workshop on Formal Tech-
niques for Safety-Critical Systems, pages 189–205.
Springer.
Mauw, S. and Oostdijk, M. (2005). Foundations of at-
tack trees. In ICISC, volume 3935, pages 186–198.
Springer.
Mens, T. (2006). On the use of graph transformations for
model refactoring. Lecture Notes in Computer Sci-
ence, 4143:219.
Merson, P. (2007). Using aspect-oriented program-
ming to enforce architecture. Technical Report
CMU/SEI-2007-TN-019, Software Engineering Insti-
tute, Carnegie Mellon University, Pittsburgh, PA.
Mouheb, D., Debbabi, M., Pourzandi, M., Wang, L., Nouh,
M., Ziarati, R., Alhadidi, D., Talhi, C., and Lima, V.
(2015a). Aspect-Oriented Security Hardening of UML
Design Models. Springer.
Mouheb, D., Debbabi, M., Pourzandi, M., Wang, L., Nouh,
M., Ziarati, R., Alhadidi, D., Talhi, C., and Lima,
V. (2015b). Model-Driven Architecture and Model
Transformations, pages 35–45. Springer International
Publishing, Cham.
Murphy, G. C., Notkin, D., and Sullivan, K. J. (2001). Soft-
ware reflexion models: Bridging the gap between de-
sign and implementation. IEEE Trans. Software Eng.,
27(4):364–380.
Nguyen, P. H. (2015). Model-driven security based on a
unified system of security design patterns. Technical
report, University of Luxembourg.
Nicolaescu, A. and Lichter, H. (2016). Behavior-based ar-
chitecture reconstruction and conformance checking.
In Muccini, H. and Harper, K. E., editors, WICSA
2016, pages 152–157, Piscataway, NJ. IEEE.
NIST 800-53 (2013). Security and Privacy Controls
for Federal Information Systems and Organizations.
Standard, National Institute of Standards and Technol-
ogy (NIST)).
Opdyke, W. F. (1992). Refactoring object-oriented frame-
works.
Oquendo, F. (2008). Dynamic software architectures: For-
mally modelling structure and behaviour with pi-adl.
In 3rd International Conference on Software Engi-
neering Advances, pages 352–359.
Pene, L., Hamza, L., and Adi, K. (2017). Compliance veri-
fication algorithm for computer systems security poli-
cies. In International Conference on E-Technologies,
pages 96–115. Springer.
Saitta, P., Larcom, B., and Eddington, M. (2005). Trike
v. 1 methodology document [draft]. dymaxion.
org/trike/Trike v1 Methodology Documentdraft.pdf.
Scandariato, R., Wuyts, K., and Joosen, W. (2015). A
descriptive study of microsofts threat modeling tech-
nique. Requirements Engineering, 20(2):163–180.
Schaad, A. and Borozdin, M. (2012). Tam 2: automated
threat analysis. In 27th Annual ACM Symposium on
Applied Computing, pages 1103–1108. ACM.
Sheyner, O., Haines, J., Jha, S., Lippmann, R., and Wing,
J. M. (2002). Automated generation and analysis of
attack graphs. In IEEE Symposium on Security and
privacy, pages 273–284. IEEE.
UcedaVelez, T. and Morana, M. M. (2015). Risk Centric
Threat Modeling: Process for Attack Simulation and
Threat Analysis. John Wiley & Sons.
van den Berghe, A., Scandariato, R., Yskout, K., and
Joosen, W. (2015). Design notations for secure soft-
ware: a systematic literature review. Software & Sys-
tems Modeling, pages 1–23.
Wang, C.-M., Huang, C.-C., Chen, H.-M., and Wang, S.-T.
(2007). Conformance checking of running programs
in dynamic aspect-oriented systems. In 14th Asia-
Pacific Software Engineering Conference, pages 183–
190, Los Alamitos, Calif. IEEE Computer Society.
Yskout, K., Scandariato, R., De Win, B., and Joosen, W.
(2008). Transforming security requirements into ar-
chitecture. In Availability, Reliability and Security,
2008. ARES 08. Third International Conference on,
pages 1421–1428. IEEE.
Yskout, K., Scandariato, R., and Joosen, W. (2012).
Does organizing security patterns focus architectural
choices? In Proceedings of the 34th International
Conference on Software Engineering, pages 617–627.
IEEE Press.
Zuliani, P., Platzer, A., and Clarke, E. M. (2013). Bayesian
statistical model checking with application to state-
flow/simulink verification. Formal Methods in System
Design, 43(2):338–367.
ICISSP 2018 - 4th International Conference on Information Systems Security and Privacy
446