{"id":1650,"date":"2024-02-08T08:46:49","date_gmt":"2024-02-08T13:46:49","guid":{"rendered":"https:\/\/carleton.ca\/cybersea\/?p=1650"},"modified":"2026-01-26T10:41:50","modified_gmt":"2026-01-26T15:41:50","slug":"new-publication-formal-model-based-argument-patterns-for-security-cases","status":"publish","type":"post","link":"https:\/\/carleton.ca\/cybersea\/2024\/new-publication-formal-model-based-argument-patterns-for-security-cases\/","title":{"rendered":"New Publication: Formal Model-Based Argument Patterns for Security Cases"},"content":{"rendered":"\n<section class=\"w-screen px-6 cu-section cu-section--white ml-offset-center md:px-8 lg:px-14\">\n    <div class=\"space-y-6 cu-max-w-child-5xl  md:space-y-10 cu-prose-first-last\">\n\n            <div class=\"cu-textmedia flex flex-col lg:flex-row mx-auto gap-6 md:gap-10 my-6 md:my-12 first:mt-0 max-w-5xl\">\n        <div class=\"justify-start cu-textmedia-content cu-prose-first-last\" style=\"flex: 0 0 100%;\">\n            <header class=\"font-light prose-xl cu-pageheader md:prose-2xl cu-component-updated cu-prose-first-last\">\n                                    <h1 class=\"cu-prose-first-last font-semibold !mt-2 mb-4 md:mb-6 relative after:absolute after:h-px after:bottom-0 after:bg-cu-red after:left-px text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] pb-5 after:w-10 text-cu-black-700 not-prose\">\n                        New Publication: Formal Model-Based Argument Patterns for Security Cases\n                    <\/h1>\n                \n                                \n                            <\/header>\n\n                    <\/div>\n\n            <\/div>\n\n    <\/div>\n<\/section>\n\n<p>Our recent paper &#8220;Formal Model-Based Argument Patterns for Security Cases&#8221; is now available online! This paper proposes an approach to constructing security assurance cases using formal methods. The proposed approach involves the following three steps: (1) decomposing security requirements and deriving security threats; (2) formalizing the system model and security threats; and (3) deriving the security argument patterns supported by the results of the formal verification of the security requirements. We apply the patterns to build security cases of an autonomous drone case study system.<\/p>\n\n\n\n<p>This work is the result of a collaboration with with colleagues at <a href=\"https:\/\/www.irit.fr\/en\/home\/\">IRIT<\/a> and <a href=\"https:\/\/list.cea.fr\/en\/\">CEA List<\/a>. It was presented at the <a href=\"https:\/\/www.europlop.net\/conference\/\">28th European Conference on Pattern Languages of Programs (EuroPLoP 2023)<\/a> in July 2023. See <a href=\"https:\/\/carleton.ca\/cybersea\/publications\/\">Publications<\/a> for more details!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our recent paper &#8220;Formal Model-Based Argument Patterns for Security Cases&#8221; is now available online! This paper proposes an approach to constructing security assurance cases using formal methods. The proposed approach involves the following three steps: (1) decomposing security requirements and deriving security threats; (2) formalizing the system model and security threats; and (3) deriving the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":431,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[41],"tags":[],"class_list":["post-1650","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-publication"],"acf":{"cu_post_thumbnail":""},"_links":{"self":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/1650","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/comments?post=1650"}],"version-history":[{"count":1,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/1650\/revisions"}],"predecessor-version":[{"id":1652,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/1650\/revisions\/1652"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media\/431"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media?parent=1650"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/categories?post=1650"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/tags?post=1650"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}