A limited technical background is sufficient for attack-defense tree acceptability: Dataset
Abstract (English)
Study description
Attack-defense trees (ADTs) are a prominent graphical threat modeling method that is highly recommended for analyzing and communicating security-related information. Despite this, existing empirical studies of attack trees have established their acceptability only for users with highly technical (computer science) backgrounds while raising questions about their suitability for threat modeling stakeholders with a limited technical background. Our research addresses this gap by investigating the impact of the users' technical background on ADT acceptability in an empirical study.
Our Method Evaluation Model-based study consisted of n=102 participants (53 with a strong computer science background and 49 with a limited computer science background) who were asked to complete a series of ADT-related tasks. By analyzing their responses and comparing the results, we reveal that a very limited technical background is sufficient for ADT acceptability. This finding underscores attack trees' viability as a threat modeling method.
Artifact description
This artifact includes the models (attack-defense trees) created by the participants in the study tasks, the study responses to perception questions (both Likert and short answer), the code used to statistically evaluate those survey responses, the study question text and images, the qualitative evaluation rubric for self-drawn ADTs, and the lecture plan and slides. With these artifacts, it should be possible to verify our results, organize training on attack-defense trees, and develop future studies of attack-defense tree acceptability.
Table of contents (English)
The following is a description of each of the items in the repository
ADT1.zip
- Folder containing
.png
and.xml
files representing ADTs created from the ADT1 task (drawing ADTs from leaf nodes)
- Folder containing
ADT2.zip
- Folder containing
.png
and.xml
files representing ADTs created from the ADT2 task (drawing ADTs from a written scenario)
- Folder containing
ADT3.zip
- Folder containing
.png
and.xml
files representing ADTs created from the ADT3 task (drawing ADTs of a self selected scenario)
- Folder containing
Survey Data.csv
.csv
file containing the collected participant responses to both the Large Study (LS) and Small Study (SS). This includes processed data, such as the results of qualitative analysis and the quantitative data pulled from the ADTs.
Statistics.ipynb
- Jupyter notebook containing code to run our statistical tests on
Survey Data.csv
. This requires thatSurvey Data.csv
is placed in the same folder or that thePATH
variable is set.
- Jupyter notebook containing code to run our statistical tests on
Small Study (SS).pdf
- The question text and images from the small study.
Large Study (LS).pdf
- The question text and images from the large study.
ADT3 Qualitative Evaluation Rubric.pdf
- The rubric used to qualitatively evaluate the ADT3 (self drawn ADTs) according to four categories: cohesiveness, conciseness, clarity, and completeness.
Lecture Plan.pdf
- A detailed list of the topics covered in the training lecture, as well as advice on how to convert this into a training suitable in a professional/industry context
Lecture Slides.pptx
- The powerpoint presentation of the slides used during the training lecture.
Technical info (English)
The intructions to run the Statistics.ipynb
jupyter notebook are as follows:
Notebook to run statistical testing for paper titled A limited technical background is sufficient for attack-defense tree acceptability accepted to 34th USENIX Security Symposium. The file necessary to run this notebook is Survey Data.csv
. If this file is located in a different location to the jupyter notebook, you must change the PATH
variable.
The cells in this notebook are designed to be run in order. Once the PATH
variable is set, the notebook can be run by Running All Cells.
Files
ADT1.zip
Files
(79.8 MB)
Name | Size | Download all |
---|---|---|
md5:c0f73cbdf9bfe100c5d3a30a4640500e
|
20.1 MB | Preview Download |
md5:01e2c0879436fc1f1fbc6a5335d29a82
|
22.9 MB | Preview Download |
md5:ef534964bc43b15c076cbea38b0b0b59
|
40.0 kB | Preview Download |
md5:e592fc0c0a56e98a1cb149602b68566f
|
31.5 MB | Preview Download |
md5:9c75b1230b5f5ebcbaf521a673470306
|
76.0 kB | Preview Download |
md5:e228400ffe978e45b6074fc6b361d0ee
|
85.9 kB | Preview Download |
md5:281d1d8891db8d70bfddfd41ff15c5bf
|
3.4 MB | Download |
md5:051ccc141434a559974090bec748db69
|
1.4 MB | Preview Download |
md5:6d68f8005d35f0b348a494f43ee0914c
|
70.8 kB | Preview Download |
md5:8ef5896892fd2509509956c33dd3c625
|
224.1 kB | Preview Download |