decomposition algorithm. It also enables to perform
sensitivity analysis on different parameters such as
defender budget and uncertainty in probability esti-
mations. In our work, we did not cover counter-
measure optimisation but we could consider how to
model the residual risk and try to minimise it from the
point of view of the defender, including using multi-
objective approach.
6 CONCLUSION & NEXT STEPS
In this paper, we extended our approach to explore
the design space by allowing combination of alterna-
tives using model-based approach more specifically
goal-oriented. We focused our work on the concept
of obstacles as they generate many alternatives which
need to be combined to reach a good assurance level.
We illustrated the approach on a security context to
explore an attack tree. In order to investigate multi-
ple risk and cost factors, we showed how to imple-
ment a multi-objective approach computing a Pareto
front. Our work was implemented with the Objectiver
toolset and using the OscaR.CP optimisation library.
Our future work will focus on enriching our ap-
proach. First, we plan to analyse in deeper details
the composition of a Pareto front. Then, we aim at
supporting specialised forms of obstacle refinement
for the safety and security contexts, possibly in a co-
engineering approach. Finally, we would like to ex-
tend our work to cover the resolution step which can
introduce more alternatives. Based on this, different
optimisations can be investigated to propose how to
best control and improve the design of a system.
REFERENCES
Bagnall, A., Rayward-Smith, V., and Whittley, I. (2001).
The next release problem. Information and Software
Technology, 43(14):883 – 890.
Bhuiyan, T. H. et al. (2016). Minimizing expected max-
imum risk from cyber-attacks with probabilistic at-
tack success. In IEEE Symposium on Technologies
for Homeland Security.
Buldas, A. et al. (2020). Attribute evaluation on attack trees
with incomplete information. Computers & Security,
88.
Butts, J. W., Mills, R. F., and Baldwin, R. O. (2005). De-
veloping an insider threat model using functional de-
composition. In Computer Network Security.
Calderon, A. et al. (2012). Webred: A model-driven tool
for web requirements specification and optimization.
In Web Engineering.
Dardenne, A., van Lamsweerde, A., and Fickas, S. (1993).
Goal-directed requirements acquisition. Sci. Comput.
Program., 20(1-2):3–50.
Dewri, R. et al. (2007). Optimal security hardening using
multi-objective optimization on attack tree models of
networks. In Proc. of the 14th ACM Conference on
Computer and Communications Security.
Fila, B. and Wideł, W. (2019). Efficient attack-defense tree
analysis using pareto attribute domains. In IEEE 32nd
Computer Security Foundations Symposium (CSF).
Hartert, R. and Schaus, P. (2014). A support-based algo-
rithm for the bi-objective pareto constraint. In Proc.
of the 28th AAAI Conference on Artificial Intelligence,
July 27-31, Qu
´
ebec, Canada.
Heaven, W. and Letier, E. (2011). Simulating and optimis-
ing design decisions in quantitative goal models. In
IEEE 19th Int. Requirements Engineering Conference.
ITU (2012). Z.151 (10/12), User Requirements Notation
(URN) - Language Definition.
Ketel, M. (2008). It security risk management. In Proceed-
ings of the 46th Annual Southeast Regional Confer-
ence on XX, ACM-SE 46.
Kumar, R., Ruijters, E., and Stoelinga, M. (2015). Quanti-
tative attack tree analysis via priced timed automata.
In Formal Modeling and Analysis of Timed Systems.
Mogk, N. W. (2014). A requirements management system
based on an optimization model of the design process.
Procedia Computer Science, 28:221 – 227. 2014 Con-
ference on Systems Engineering Research.
Nguyen, C. M. et al. (2018). Multi-objective reasoning with
constrained goal models. Requir. Eng., 23(2).
OscaR Team (2012). OscaR: Operational Research in Scala.
https://bitbucket.org/oscarlib/oscar.
Ponsard, C. and Darimont, R. (2020). Towards multi-
objective optimisation of quantitative goal models us-
ing constraint programming. In Proc. of the 9th Int.
Conf. on Operations Research and Enterprise Sys-
tems, ICORES, Valletta, Malta, Feb. 22-24.
Respect-IT (2005). The Objectiver Goal-Oriented Require-
ments Engineering Tool. http://www.objectiver.com.
Schneier, B. (1999). Attack trees. Dr. Dobb’s journal,
24(12).
Siddiqi, M. A. et al. (2018). Attack-tree-based threat mod-
eling of medical implants. In PROOFS 2018, 7th Int.
Workshop on Security Proofs for Embedded Systems,
Amsterdam, The Netherlands.
van Harmelen, F., Lifschitz, V., and Porter, B. (2008).
Handbook of Knowledge Representation. ISSN. El-
sevier Science.
van Lamsweerde, A. (2009). Requirements Engineering -
From System Goals to UML Models to Software Spec-
ifications. Wiley.
van Lamsweerde, A. and Letier, E. (2000). Handling obsta-
cles in goal-oriented requirements engineering. IEEE
Trans. on Software Engineering, 26(10):978–1005.
Weiss, J. (1991). A System Security Engineering Process.
Yu, E. S. K. and Mylopoulos, J. (1997). Enterprise mod-
elling for business redesign: The i* framework. SIG-
GROUP Bull., 18(1):59–63.
Zhang, Y., Finkelstein, A., and Harman, M. (2008). Search
based requirements optimisation: Existing work and
challenges. In Requirements Engineering: Founda-
tion for Software Quality.
Towards Quantitative Trade-off Analysis in Goal Models with Multiple Obstacles using Constraint Programming
543