
injection rather than focusing only on individual vul-
nerabilities.
Additionally, the explicit representation of com-
promised assets and associated vulnerabilities allows
stakeholders to evaluate potential threats more effec-
tively and assign security controls with minimal ef-
fort. By associating vulnerability categories with as-
sets, AADT facilitates proactive, category-level miti-
gation strategies that can address future attacks within
the same vulnerability class. We formalize AADT
and demonstrate its unique strengths in refinement
and impact analysis through a case study. Future in-
tegration of the AADT representation into security
modelling tools can facilitate security experts’ under-
standing of systems designs and security posture as
well as their active role in designing trustworthy sys-
tems.
ACKNOWLEDGEMENTS
This work is supported by ICO, Institut Cybers
´
ecurit
´
e
Occitanie, funded by R
´
egion Occitanie, France, and
by Innovate UK, grant number 75243.
REFERENCES
Ali, A. T. and Gruska, D. P. (2019). Attack protection tree.
In CS&P.
Arnold, F., Guck, D., Kumar, R., and Stoelinga, M. (2014).
Sequential and parallel attack tree modelling. In Inter-
national Conference on Computer Safety, Reliability,
and Security, pages 291–299. Springer.
Aslanyan, Z., Nielson, F., and Parker, D. (2016). Quanti-
tative verification and synthesis of attack-defence sce-
narios. In 2016 IEEE 29th Computer Security Foun-
dations Symposium (CSF), pages 105–119. IEEE.
Bagnato, A., Kordy, B., Meland, P. H., and Schweitzer, P.
(2012). Attribute decoration of attack–defense trees.
International Journal of Secure Software Engineering
(IJSSE), 3(2):1–35.
Behrmann, G., David, A., Larsen, K. G., H
˚
akansson, J., Pet-
tersson, P., Yi, W., and Hendriks, M. (2006). Uppaal
4.0.
Buldas, A., Laud, P., Priisalu, J., Saarepera, M., and
Willemson, J. (2006). Rational choice of security
measures via multi-parameter attack trees. In Inter-
national Workshop on Critical Information Infrastruc-
tures Security, pages 235–248. Springer.
Force, J. T. and Initiative, T. (2013). Security and privacy
controls for federal information systems and organi-
zations. NIST Special Publication, 800(53):8–13.
Fraile, M., Ford, M., Gadyatskaya, O., Kumar, R.,
Stoelinga, M., and Trujillo-Rasua, R. (2016). Using
attack-defense trees to analyze threats and counter-
measures in an atm: a case study. In IFIP Working
Conference on The Practice of Enterprise Modeling,
pages 326–334. Springer.
Gadyatskaya, O., Hansen, R. R., Larsen, K. G., Legay, A.,
Olesen, M. C., and Poulsen, D. B. (2016a). Modelling
attack-defense trees using timed automata. In Interna-
tional Conference on Formal Modeling and Analysis
of Timed Systems, pages 35–50. Springer.
Gadyatskaya, O., Harpes, C., Mauw, S., Muller, C., and
Muller, S. (2016b). Bridging two worlds: reconciling
practical risk assessment methodologies with theory
of attack trees. In International Workshop on Graphi-
cal Models for Security, pages 80–93. Springer.
Gadyatskaya, O., Jhawar, R., Kordy, P., Lounis, K., Mauw,
S., and Trujillo-Rasua, R. (2016c). Attack trees for
practical security assessment: ranking of attack sce-
narios with adtool 2.0. In International Conference on
Quantitative Evaluation of Systems, pages 159–162.
Springer.
Gadyatskaya, O. and Trujillo-Rasua, R. (2017). New direc-
tions in attack tree research: catching up with indus-
trial needs. In International Workshop on Graphical
Models for Security, pages 115–126. Springer.
Group, J. T. F. T. I. I. W. (2020). Security and pri-
vacy controls for information systems and organiza-
tions. Technical Report NIST Special Publication (SP)
800-53, Rev. 5, Includes updates as of September,
2020, National Institute of Standards and Technology,
Gaithersburg, MD.
Jhawar, R., Kordy, B., Mauw, S., Radomirovi
´
c, S., and
Trujillo-Rasua, R. (2015). Attack trees with sequen-
tial conjunction. In IFIP International Information
Security and Privacy Conference, pages 339–353.
Springer.
Jhawar, R., Lounis, K., and Mauw, S. (2016). A stochastic
framework for quantitative analysis of attack-defense
trees. In International Workshop on Security and Trust
Management, pages 138–153. Springer.
Kordy, B., Mauw, S., Radomirovi
´
c, S., and Schweitzer, P.
(2014). Attack–defense trees. Journal of Logic and
Computation, 24(1):55–87.
Kordy, B., Mauw, S., and Schweitzer, P. (2012). Quanti-
tative questions on attack–defense trees. In Interna-
tional Conference on Information Security and Cryp-
tology, pages 49–64. Springer.
Kumar, R., Ruijters, E., and Stoelinga, M. (2015). Quanti-
tative attack tree analysis via priced timed automata.
In International Conference on Formal Modeling and
Analysis of Timed Systems, pages 156–171. Springer.
Lenin, A., Gadyatskaya, O., Ionita, D., Pieters, W., Tanner,
A., Saraiva, S., Muller, C., Willemson, J., Ford, M.,
and Muller, S. (2016). Technology-supported risk es-
timation by predictive assessment of socio-technical
security.
Mauw, S. and Oostdijk, M. (2006). Foundations of attack
trees, information security and cryptology-icisc 2005.
In 8th international conference, Seoul, Korea, pages
186–198.
Messe, N. (2021). Security by Design: An asset-based ap-
proach to bridge the gap between architects and secu-
rity experts. PhD thesis, Universit
´
e de Bretagne Sud.
AADT: Asset-Driven Attack-Defense Tree
571