Publications

  1. Arias, J., Maśko, Ł., Penczek, W., Petrucci, L., & Sidoruk, T. (2022). Minimal Schedule with Minimal Number of Agents in Attack-Defence Trees. Proceedings of the 26th International Conference on Engineering of Complex Computer Systems, ICECCS, Online, March 26-30, 2022, 1–10.
    Abstract:

    Expressing attack-defence trees in a multi-agent setting allows for studying a new aspect of security scenarios, namely how the number of agents and their task assignment impact the performance, e.g. attack time, of strategies executed by opposing coalitions. Optimal scheduling of agents’ actions, a non-trivial problem, is thus vital. We discuss associated caveats and propose an algorithm that synthesises such an assignment, targeting minimal attack time and using minimal number of agents for a given attack-defence tree

    Paper:
    Bibtex:
    @inproceedings{ICECCS:2022,
      author = {Arias, Jaime and Maśko, Łukasz and Penczek, Wojciech and Petrucci, Laure and Sidoruk, Teofil},
      title = {{M}inimal {S}chedule with {M}inimal {N}umber of {A}gents in {A}ttack-{D}efence {T}rees},
      booktitle = {Proceedings of the 26th International Conference on Engineering of Complex Computer Systems, {ICECCS}, Online, March 26-30, 2022},
      pages = {1--10},
      publisher = {IEEE},
      year = {2022},
      url = {},
      artifact = {https://depot.lipn.univ-paris13.fr/parties/publications/minimal-scheduling}
    }
    
  2. Arias, J., Penczek, W., Petrucci, L., & Sidoruk, T. (2021). ADT2AMAS: Managing Agents in Attack-Defence Scenarios: Demonstration Track. In U. Endriss, A. Nowé, F. Dignum, & A. Lomuscio (Eds.), Proceedings of the 20th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2021, Online, May 3-7, 2021 (pp. 1749–1751). International Foundation for Autonomous Agents and Multiagent Systems. https://doi.org/10.1109/ICECCS54210.2022.00009
    Abstract:

    Expressing attack-defence trees (ADTrees) in a multi-agent setting allows for studying a new aspect of security scenarios, namely how the number of agents and their task assignment impact the performance of attacking and defending strategies executed by agent coalitions. Our tool ADT2AMAS allows for transforming ADTrees into extended asynchronous multi-agent systems and computing an optimal schedule with the minimal number of agents. ADT2AMAS is integrated within the graphical verification platform CosyVerif, but can also be run standalone.

    Bibtex:
    @inproceedings{AAMAS2021,
      author = {Arias, Jaime and Penczek, Wojciech and Petrucci, Laure and Sidoruk, Teofil},
      title = {ADT2AMAS: Managing Agents in Attack-Defence Scenarios: Demonstration Track},
      booktitle = {Proceedings of the 20th International Conference on Autonomous Agents
                     and Multiagent Systems, {AAMAS 2021}, Online, May 3-7,
                     2021},
      editor = {Endriss, U. and Nowé, A. and Dignum, F. and Lomuscio, A.},
      isbn = {9781450383073},
      pages = {1749--1751},
      doi = {10.1109/ICECCS54210.2022.00009},
      publisher = {International Foundation for Autonomous Agents and Multiagent Systems},
      year = {2021},
      url = {https://dl.acm.org/doi/10.5555/3463952.3464225},
      artifact = {https://www.youtube.com/watch?v=DGLtUSP-ao8}
    }
    
  3. Petrucci, L., Knapik, M., Penczek, W., & Sidoruk, T. (2019). Squeezing State Spaces of (Attack-Defence) Trees. 24th International Conference on Engineering of Complex Computer Systems, ICECCS 2019, Guangzhou, China, November 10-13, 2019, 71–80. https://ieeexplore.ieee.org/document/8882746
    Abstract:

    In earlier work, we presented translations of attack-defence trees (ADTrees) to extended asynchronous multi-agent systems. By avoiding some sequences, agent models constructed via these transformations already embed state space reductions. Here, we introduce Guarded Update Systems and their synchronisation topology, allowing us to define a new general reduction scheme that applies to tree topologies, and in particular to ADTrees. The reduction exploits the layered structure of a tree by avoiding unnecessary interleavings between nodes at different depths. We prove the soundness of this new method and present extensive experimental results, including scalable models, to demonstrate it can be effectively used alongside previously employed techniques.

    Bibtex:
    @inproceedings{ICECCS2019,
      author = {Petrucci, Laure and Knapik, Michal and Penczek, Wojciech and Sidoruk, Teofil},
      title = {Squeezing State Spaces of (Attack-Defence) Trees},
      booktitle = {24th International Conference on Engineering of Complex Computer Systems,
                     {ICECCS} 2019, Guangzhou, China, November 10-13, 2019},
      pages = {71--80},
      publisher = {{IEEE}},
      year = {2019},
      url = {https://ieeexplore.ieee.org/document/8882746}
    }
    
  4. Arias, J., Budde, C. E., Penczek, W., Petrucci, L., Sidoruk, T., & Stoelinga, M. (2020). Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-agent Systems. 22nd International Conference on Formal Engineering Methods, ICFEM 2020, Singapore, Singapore, March 1-3, 2021, 12531, 3–19. https://doi.org/10.1007/978-3-030-63406-3_1
    Abstract:

    Attack-Defence Trees (ADTrees) are a well-suited formalism to assess possible attacks to systems and the efficiency of counter-measures. This paper extends the available ADTree constructs with reactive patterns that cover further security scenarios, and equips all constructs with attributes such as time and cost to allow for quantitative analyses. We model ADTrees as (an extension of) Asynchronous Multi-Agents Systems: EAMAS. The ADTree–EAMAS transformation allows us to quantify the impact of different agents configurations on metrics such as attack time. Using EAMAS also permits parametric verification: we derive constraints for property satisfaction, e.g. the maximum time a defence can take to block an attack. Our approach is exercised on several case studies using the Uppaal and IMITATOR tools. We developed the open-source tool adt2amas implementing our transformation.

    Bibtex:
    @inproceedings{ICFEM2020,
      author = {Arias, Jaime and Budde, Carlos E. and Penczek, Wojciech and Petrucci, Laure and Sidoruk, Teofil and Stoelinga, Mari{\"{e}}lle},
      title = {Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-agent
                     Systems},
      booktitle = {22nd International Conference
                     on Formal Engineering Methods, {ICFEM} 2020, Singapore, Singapore,
                     March 1-3, 2021},
      series = {LNCS},
      volume = {12531},
      pages = {3--19},
      publisher = {Springer},
      year = {2020},
      doi = {10.1007/978-3-030-63406-3\_1},
      url = {https://link.springer.com/chapter/10.1007/978-3-030-63406-3_1},
      artifact = {https://depot.lipn.univ-paris13.fr/parties/publications/transformation-amas}
    }
    
Fork me from LIPN