<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Enhancing Threat Model Validation: A White-Box Approach based on Statistical Model Checking and Process Mining</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Roberto</forename><surname>Casaluce</surname></persName>
							<email>roberto.casaluce@santannapisa.it</email>
							<affiliation key="aff0">
								<orgName type="department">Institute of Economics and L&apos;EMbeDS</orgName>
								<orgName type="institution">Sant&apos;Anna School of Advanced Studies</orgName>
								<address>
									<settlement>Pisa</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Pisa</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andrea</forename><surname>Burratin</surname></persName>
							<affiliation key="aff2">
								<orgName type="institution">DTU Technical University of Denmark</orgName>
								<address>
									<settlement>Lyngby</settlement>
									<country key="DK">Denmark</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Francesca</forename><surname>Chiaromonte</surname></persName>
							<email>francesca.chiaromonte@santannapisa.it</email>
							<affiliation key="aff0">
								<orgName type="department">Institute of Economics and L&apos;EMbeDS</orgName>
								<orgName type="institution">Sant&apos;Anna School of Advanced Studies</orgName>
								<address>
									<settlement>Pisa</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
							<affiliation key="aff3">
								<orgName type="department">Dept. of Statistics and Huck Institutes of the Life Sciences</orgName>
								<orgName type="institution">Penn State University</orgName>
								<address>
									<country key="US">USA</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Alberto</forename><forename type="middle">Lluch</forename><surname>Lafuente</surname></persName>
							<affiliation key="aff2">
								<orgName type="institution">DTU Technical University of Denmark</orgName>
								<address>
									<settlement>Lyngby</settlement>
									<country key="DK">Denmark</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andrea</forename><surname>Vandin</surname></persName>
							<email>andrea.vandin@santannapisa.it</email>
							<affiliation key="aff0">
								<orgName type="department">Institute of Economics and L&apos;EMbeDS</orgName>
								<orgName type="institution">Sant&apos;Anna School of Advanced Studies</orgName>
								<address>
									<settlement>Pisa</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
							<affiliation key="aff2">
								<orgName type="institution">DTU Technical University of Denmark</orgName>
								<address>
									<settlement>Lyngby</settlement>
									<country key="DK">Denmark</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Enhancing Threat Model Validation: A White-Box Approach based on Statistical Model Checking and Process Mining</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">7C53823982ADDF86B975B81D2792DF1B</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:25+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Threat models</term>
					<term>Probabilistic modeling</term>
					<term>Statistical model checking</term>
					<term>Process mining</term>
					<term>Attack-defense trees</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Our method addresses the challenge of validating threat models by comparing actual behavior with expected behavior. Statistical Model Checking (SMC) is frequently the more appropriate technique for validating models, as it relies on statistically relevant samples to analyze systems with potentially infinite state spaces. In the case of black-box systems, where it is not possible to make complete assumptions about the transition structure, black-box SMC becomes necessary. However, the numeric results of the SMC analysis lack insights on the model's dynamics, prompting our proposal to enhance SMC analysis by incorporating visual information on the behavior that led to a given estimation. Our method improves traditional model validation using SMC by enriching its analyses with Process Mining (PM) techniques. Our approach takes simulated event logs as inputs, and uses PM techniques to reconstruct an observed model to be compared with the graphical representation of the original model, obtaining a diff model highlighting discrepancies among expected and actual behavior. This allows the modeler to address unexpected or missing behaviors. In this paper we further customize the diff model for aspects specific to threat model analysis, incorporating features such as new colored edges to symbolize an attacker's initial assets and a automatic fix for simple classes of modeling errors which generate unexpected deadlocks in the simulated model. Our approach offers an effective and scalable solution for threat model validation, contributing to the evolving landscape of risk modeling and analysis.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Our work introduces an approach to validate threat models by providing accessible tools for observing and comparing the actual behavior of a model with the expected one. When dealing with quantitative aspects in model behavior validation, exact or statistical analysis techniques are commonly employed. Exact techniques, while providing precise quantitative properties, may face challenges in handling complex models due to the state-space explosion problem <ref type="bibr" target="#b0">[1]</ref>. On the contrary, statistical analysis techniques, like Statistical Model Checking (SMC) <ref type="bibr" target="#b1">[2]</ref>, rely on statistically relevant samples, offering a viable solution for analyzing complex systems with potentially infinite state spaces, albeit providing statistically reliable estimations rather than exact results. In the case of black-box systems, where it is not possible to assume the complete transition structure, employing a black-box SMC <ref type="bibr" target="#b2">[3]</ref> becomes necessary for analyzing dynamics without prior system knowledge, yielding numerical estimates and plots. However, these come without an explanation for the obtained numerical results, i.e., we do not get an explanation on the observed behavior and on why it led to such results. Consider a classic threat model depicting a thief's strategies for robbing a bank <ref type="bibr" target="#b0">[1]</ref>, analyzed using SMC to quantify the probability of a successful robbery, resulting in an unexpected low value. This prompts questions about the reasons behind the extreme value and whether it aligns with the model's intended dynamic or whether it signifies a bug. The numeric results do not provide any insights into why the analysis yielded those results or if there are issues in the model. On this basis, we formulated our proposal <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b4">5]</ref>. Our approach enhances SMC analysis results by automatically incorporating explicit visual information highlighting discrepancies between the model and specified criteria. This not only aids in model refinement but also serves as a comprehensive testing method, allowing experimentation with various settings within the same model structure to assess simulated model correctness. To be more specific, our method involves enriching SMC analyses by post-processing and analyzing SMC byproducts, such as log files stored while performing the simulations. We use data-driven techniques like Process Mining (PM). PM helps to identify process patterns, bottlenecks, and other model issues through visualizing activity flow <ref type="bibr" target="#b5">[6]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Output Models</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Reconstruction of input model from SMC simulations via PM Comparison between reconstruction and input models (Diff model)</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Input Model</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Graphical representation of procedural part of the RisQFLan model</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Edges Nodes</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Edges and Nodes missing in the original model Edges and Nodes missing in the simulated model</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Initial assets</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Edges and Nodes in both models</head><note type="other">Description Legend Diff Model</note><p>Figure <ref type="figure" target="#fig_0">1</ref> depicts an abstract example of a model validated using our method. The input model represents an abstract model with different states, and actions used to move between those states. The simulator starts from the node A by choosing the corresponding action to move to other states of the model. To validate the output of an SMC, without our methodology, a modeler can only use the obtained numerical results, such as the probability of reaching a certain node in the model. Conversely, our approach enables the modeler to scrutinize simulation results in a model-to-model language, as opposed to model-to-numbers. Our method takes as inputs the simulated event logs, stored while performing the simulations necessary for statistical model checking. These logs are mined with Process Mining techniques and, then, used to reconstruct the first "Output Model". The rightmost model depicts the graph obtained by comparing the "Input Model" and the reconstructed one, highlighting the differences between the original model and the simulated one. The differences highlighted in the rightmost "Output Model, " i.e., the diff model, enable the modeler to quickly identify issues, such as unexpected or missing behaviors.</p><p>Several studies on risk modeling and analysis utilize SMC to evaluate the properties of a threat model <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref>. Additionally, there are other works that perform threat modeling analysis using PM -refer to <ref type="bibr" target="#b8">[9]</ref> for an overview of works on cybersecurity and PM. Nevertheless, to the best of our knowledge, the first preliminary work in which SMC results were enhanced with PM techniques to aid the modeler in visually identifying unwanted behaviors was presented in our previous works <ref type="bibr" target="#b3">[4]</ref>. We further extended such work in <ref type="bibr" target="#b4">[5]</ref> by automatically computing a diff model based on the original model specification language. The latter study demonstrated the effectiveness and scalability of our method, showcasing its applicability in both Product Line Engineering (PLE), and threat analysis domains. In the current work, we expand upon the diff model introduced in <ref type="bibr" target="#b4">[5]</ref> and further customize it for threat model analysis. The updated diff model incorporates a new type of edge colored in green, symbolizing the initial assets possessed by the attacker before initiating the attack. For instance, an initial asset could be one of the two combinations required to open the bank vault, held by a bank clerk who decides to rob the bank. Our enhanced diff model takes into account the transitions and states in the model, depicting the attacker's initial assets by singling them out from other types of nodes and edges. This distinction helps to separate them from other transitions that are missing due to an error in the formal model. Additionally, we have incorporated a component in our method that is able to automatically fix specific classes of issues discovered in the modeler, in particular when unexpected deadlocks are detected in the simulated model. In Section 4, we conducted experiments on the RobBank model <ref type="bibr" target="#b0">[1]</ref> to illustrate the effectiveness of our method, and we exemplify the automatic fixes proposed by our framework for the deadlocks identified in the original model.</p><p>The remainder of the paper is structured as follows: Section 2 introduces necessary background material, along with a brief introduction to the RobBank model as a running example. Following this, Section 3 presents our methodology for the diff model and the approach to fixing deadlocks. Section 4 validates our method on the presented case study. Finally, Section 5 concludes the paper and outlines future work.</p><p>We make available the use of our updated tool with all the models, the full-size figures and the replication material for this paper are available at https://t.ly/FVs6Z.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Background</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">Modeling in RisQFLan</head><p>In the present work, we use RisQFLan <ref type="bibr" target="#b0">[1]</ref>, a domain-specific instantiation of QFLan <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b10">11,</ref><ref type="bibr" target="#b11">12]</ref> applied to the risk modeling and analysis domain. RisQFLan provides more capabilities than other risk analysis tools since it allows for quantitative analysis of the probability of the attack strategies in security threat models. RisQFLan allows for SMC analysis and the Probability Model Checking (PMC) technique. In RisQFLan, the probabilistic simulator and SMC (MultiVeStA) <ref type="bibr" target="#b12">[13]</ref> interact to estimate the properties of the model statistically.</p><p>For the experiments, we adopt the threat model from <ref type="bibr" target="#b0">[1]</ref>, outlining potential attack strategies for a bank robbery. The authors emphasized that the model has infinite state space which necessitates using SMC for analysis due to the impracticality of exhaustive exploration. RisQFLan models consist of a declarative part (Attack-defence tree) and a procedural part (probabilistic attacker). Refer to <ref type="bibr" target="#b0">[1]</ref> for a detailed presentation of RisQFLan. The Attack-defence tree (ADT) illustrates the potential attack strategies of an attacker to exploit a system. Attack trees are widely used in several domains like, e.g., defense (e.g., their use is recommended by NATO <ref type="bibr" target="#b13">[14]</ref>), aerospace <ref type="bibr" target="#b14">[15]</ref>, or safety-critical cyber-physical systems <ref type="bibr" target="#b15">[16]</ref>.</p><p>Figure <ref type="figure">2</ref> illustrates the ADT depicting the root attack goal of robbing the bank and sub-attacks like OpenVault and BlowUp. OpenVault refines into LearnCombo and GetToVault, connected by an AND-relation. LearnCombo further breaks down into three nodes, FindCode, governed by a 2-out-of-3relation. An attack node succeeds only if its refinements permit it. Defense nodes, such as Memo and LockDown, decrease attack success probabilities. Countermeasures, like LockDown, are dynamic defenses activated by monitored attacks. The ADT suggests two robbery strategies: opening the vault or blowing it up, both requiring access to the vault. Opening the vault necessitates learning the combination, itself dependent on discovering at least two codes.</p><p>In addition, RisQFLan enables users to specify probabilistic attacker behavior, thereby facilitating specific analyses on different types of attackers. Figure <ref type="figure">3</ref>   system vulnerabilities and allocating resources for system protection. Furthermore, this probabilistic attacker behavior in RisQFLan may enable the incorporation of human factors into the model. For instance, this can be achieved by modifying probabilities associated with specific vulnerabilities in the system due to user interaction, such as clicking on infected links or falling for phishing emails. Alternatively, users may design attacker behaviors that account for these human factors. In RisQFLan, the attacker behavior is modeled as a rated transition system. The transitions are labeled with the actions executed, and the rates used to compute the probability of completing one of the actions. These transitions also include the so-called guards that represent the conditions in which an action can be executed and the possible effects of executing a specific action. Besides the transition guards on a specific action, RisQFLan supports quantitative constraints that allow the imposition of limitations on the attacker's behavior by adding a total cost that an attacker can spend during the attack on a system. Any attempts to perform an attack will cost the attacker even if the attack fails, and they can keep trying to complete the attack until the limit imposed by the total cost is not reached. Once the attacker has run out of resources, they cannot try any other attacks on the system. These quantitative constraints allow us to test the system against different types of attackers with different resources.  <ref type="bibr" target="#b0">[1]</ref>. We focus on relevant parts for our experiments. For instance, in Figure <ref type="figure">4</ref> line 3 are listed the cost for each attack node, and in line 6 quantitative constraints allow the attacker to complete the robbery, ensuring that the total cost will never exceed 100 EUR.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">SMC</head><p>Black-box statistical model checking is a method employed in analyzing RisQFLan models using the tool MultiVeStA. This approach is applied to quantitative properties, such as the likelihood of robbing the bank. MultiVeStA conducts numerous probabilistic simulations, ensuring statistically reliable estimations of the specified property. It operates as a simulation-based technique, making no assumptions about the overarching model behavior. MultiVeStA, a black-box SMC tool, facilitates simultaneous statistical analyses of multiple properties, offering scalability and the generation of confidence intervals for user-specified parameters. For instance, when estimating the expected value E[X] for robbing the bank, MultiVeStA computes the mean x from n independent simulations within a confidence interval. It has been successful applied in diverse domains, including economic agent-based models <ref type="bibr" target="#b12">[13]</ref>, highlyconfigurable systems <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b9">10]</ref>, public transportation systems <ref type="bibr" target="#b16">[17,</ref><ref type="bibr" target="#b17">18]</ref>, security risk modeling <ref type="bibr" target="#b0">[1]</ref>, lending pools in decentralized finance <ref type="bibr" target="#b18">[19]</ref>, business process modeling <ref type="bibr" target="#b19">[20]</ref>, crowd steering scenarios <ref type="bibr" target="#b20">[21]</ref>, and robotic scenarios with planning capabilities <ref type="bibr" target="#b21">[22]</ref>.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.">Process mining</head><p>This section provides a brief overview of the primary tasks involved in process-oriented data-driven techniques, commonly referred to as Process Mining (PM). PM serves as the interdisciplinary field that connects data-centric and model-based analysis techniques <ref type="bibr" target="#b5">[6]</ref>. It utilizes real process executions to derive pertinent insights into how the observed behavior deviates from the intended behavior. PM encompasses three key activities: (control-flow) discovery, enhancement, and conformance checking. Discovery seeks to unveil an abstract representation of the executed process by consolidating all observed instances into a unified model. Once the process model is discovered, it can be enriched with additional information, such as the frequency of activity/path executions-an activity known as enhancement. Finally, conformance checking aims to identify cases where the actual executions deviate from the expected normative model. For the current work, we utilize discovery techniques to extract information from the execution traces obtained from SMC analyses. We then apply the mined model to evaluate how well the generated behavior aligns with the initial expectations.</p><p>In the following Section 3, we detail our method for constructing the updated diff model, which graphically highlights disparities between the simulated model's behavior and the model originally intended by the modeler. Additionally, we outline the steps employed to automatically resolve deadlocks identified in the simulated model.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Method</head><p>Our method enriches SMC with PM techniques to overcome the limitations of the classic SMC black-box validation which relies only on numerical results and counterexamples. PM allows us to incorporate a white-box analysis of the behavior of the model by leveraging mining techniques on simulated model executions. However, we go beyond a simple discovery algorithm applied to event logs and, instead, we integrate these two techniques, i.e., SMC and PM, through a graphical component given in the model specification language to facilitate the automatic discovery of missing or undesirable behaviors in the model. Figure <ref type="figure" target="#fig_4">5</ref> illustrates our methodology presented in <ref type="bibr" target="#b4">[5]</ref>. The steps employed to create the diff model are listed below:</p><p>• 1. Model creation -Our methodology starts with creating the model where the modeler defines all the system components, e.g., attack nodes, a list of constraints, and its procedural part. RisQFLan will then automatically generate the corresponding Attack-defence Tree and a graphical representation of the procedural part of the RisQFLan model describing the attacker's behavior. • 2. Log creation -The second step consists of the simulation of the model in which the modeler chooses the properties of the modeler that will be evaluated using the SMC tool MultiVeStA.</p><p>MultiVeStA has been extended with log capabilities in which two new functionalities enable the creation of an empty log file, invoked once per SMC analysis, and to add the rows to the log, invoked whenever an event (of interest) is to be recorded. • 3. Log pre-processing -In this step, we preprocess the event logs before applying PM techniques.</p><p>To maintain the correct order and prevent the loss of information about transitions in the logs, we rename actions by adding names of origin and target states. This step helps avoid losing crucial information about the executed process. • 4. Process mining -After pre-processing the event logs, we mine them using the Heuristic Miner (HM) <ref type="bibr" target="#b22">[23,</ref><ref type="bibr" target="#b5">6]</ref> algorithm. Once the Mined PM model is discovered, we convert it from a PM model into a mined RisQFLan model (representing the procedural part of a RisQFLan model). In Figure <ref type="figure" target="#fig_0">1</ref>, this corresponds to the first "Output Model". In this step, we return the names of the actions to their original ones which helps to compare the original RisQFLan model with the mined onethe "Input model" with the first "Output Model" in Figure <ref type="figure" target="#fig_0">1</ref> Additionally, the diff model includes green edges and nodes, as depicted in Figure <ref type="figure" target="#fig_0">1</ref> in the rightmost "Output model," representing the initial nodes acquired by the attacker before initiating the system breach.</p><p>Figure <ref type="figure">6</ref> illustrates the steps employed in our method to automatically fix deadlocks in the simulated model. First, we reuse the mined PM model created by mining the simulated event logs and identify the transitions that end in a deadlock. We then add new transitions to resolve these issues. Next, we extract all the system components from the RisQFLan file of the original model, which are used in an empty template of the RisQFLan file. We fill in the template with the new transition system that addresses the deadlocks.</p><p>In the following section, we demonstrate how our method can identify unwanted behaviors in the model and provide an automatic fix for those issues identified in the model.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Experiments</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Experiments on the original RobBank model</head><p>To showcase the capability of our approach in identifying undesired behaviors within this domain, we employ MultiVeStA for the analysis of the query presented in Figure <ref type="figure">7</ref>. This directs MultiVeStA to assess the likelihood of success for eight different attacks (line 7 in Figure <ref type="figure">7</ref>) at each simulation step</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Mined PM Model</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Automatic</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Refined AB model</head><p>RisQFLan bbt file  ranging from 1 to 100. Similar to the approach outlined in <ref type="bibr" target="#b0">[1]</ref>, we presume that the attacker possesses a</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Refined model</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fill in the template</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>RisQFLan bbt file</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Original model</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Extracting the original components</head><p>LaserCutter capable of bypassing the Lockdown defense and has already acquired the initial code for the vault (line 2 FindoCode1, Figure <ref type="figure">7</ref>). Our goal is to demonstrate that our methodology effectively identifies issues in the model and prompts a way to fix them.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.1.">Results analysis on the original RobBank model.</head><p>MultiVeStA instructed the probabilistic simulator to execute 320 simulations. The analysis results for step 100 are summarized in Table <ref type="table" target="#tab_2">1</ref>. As expected, the probability of a complete lockdown is zero, attributed to the presence of the LaserCutter. Consequently, the likelihood of FindCode1 is 1, as both already belong to the attacker's initial assets. The SMC results show that the probability of a successful root attack is 0.19 even with LockDown disabled. This represents a low percentage (approximately 19%) of simulations concluding with a successful bank robbery. Understanding why this occurs proves to be challenging through a mere black-box examination of numerical outcomes. Illustrated in Figure <ref type="figure">8</ref> is the diff model generated by our methodology. It exhibits two red edges and a red node, two green edges while the remaining edges and nodes are black. The green edges represent transitions that the simulator never traversed because they were already included in the initial setup of the attacker (in Figure <ref type="figure">7</ref>  node signifies a unique addition to our methodology: a deadlock node, indicating simulations that ended unexpectedly due to no enabled transitions. Examining the two red edges reveals that some simulations ended unexpectedly in the states TryFindCode and TryBlowUp, diminishing the overall success probability.</p><p>Issue in the model, and an automatic fix. The model has an issue with states TryFindCode and TryBlowUp, as highlighted in Figure <ref type="figure">8</ref>. These states can only transition to attempt attacks, and if the attacker lacks sufficient funds for the corresponding attack, they get stuck due to a maximum cost constraint of 100 EUR (line 6 in Figure <ref type="figure">4</ref>). To address this, the modeler should add escape transitions in these nodes, leading back to their parent nodes with no cost, resolving the deadlock problem and ensuring a more accurate evaluation of properties. Using the mined model, we have implemented an automatic refinement of the model that adds an escape action in the presence of a deadlock due to violating the quantitative constraints.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Refiend model</head><p>In Figure <ref type="figure">9</ref>, we enhance our model by introducing a goBack action, creating transitions from TryBlowUp to Start and from TryFindCode to TryLearnCombo in Figure <ref type="figure">9</ref>. The refined attacker behavior, shown in orange, assigns a low weight of 0.001 to these transitions, encouraging the simulator to select them  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.1.">Results on the refined model</head><p>Thanks to the introduction of these new transitions, the observed dynamics no longer manifest the previously discussed deadlocks. To ensure this outcome, we utilize the identical query as depicted in Figure <ref type="figure">7</ref>. In this particular case, MultiVeStA necessitated the execution of 320 simulations. The numerical results are listed in Table <ref type="table" target="#tab_3">2</ref>. Except LockDown, which remains static at zero and FindoCode1 which is again equal to 1, all other properties have exhibited an increment Now, the probability of successfully robbing the bank is approximately 45%. The resultant diff model is shown in Figure <ref type="figure" target="#fig_7">10</ref>, where the absence of red edges or nodes means that the identified issues in the original model are fixed.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusion and future research</head><p>In the present work, we have expanded our approach for validating simulation models, with a specific focus on threat model analysis, and we are now making our updated tool available for practitioners. The methodology involves a combination of simulation-based analysis techniques derived from Statistical Model Checking (SMC) <ref type="bibr" target="#b1">[2]</ref> and process-oriented data-driven techniques from Process Mining (PM) <ref type="bibr" target="#b5">[6]</ref>. More specifically, we employ PM to elucidate SMC analyses, generating a graphical representation of the system behavior as observed in the SMC simulations. This graphical representation has been enhanced from the original implementation by incorporating additional information beneficial for the modeler when examining the results of our method. In our experimental evaluation, we demonstrate that: (1) our methodology aids in identifying issues in the model and distinguishes them from other information that are not errors, i.e., transitions belonging to the initial assets of the attacker, and (2) it generates a refined model when errors are detected in the simulated model.</p><p>In future investigations, we will focus on developing an automated tool designed to construct a comprehensive probabilistic attacker behavior based on an attack tree. This tool will assist a modeler capable of describing a system using an attack tree but unfamiliar with creating a probabilistic attacker behavior in RisQFLan. The tool will derive the system rules governing the actions permitted or restricted for the attacker from the attack tree. For example, consider an attack on a parent node, feasible only when all its child nodes are acquired. In this scenario, the sequence of attacks initiated by the simulator should be restricted from gaining the parent node before obtaining all the child nodes. This restriction is crucial, particularly when considering, for instance, an attacker attempting a lateral movement step before gaining access to the system. Allowing such a sequence of attacks would make the model unrealistic. The new automated tool will generate a complete RisQFLan file with a realistic attacker behavior that understands the rules. The modeler can easily refine it based on the type of attacker they intend to simulate. Furthermore, as part of future research, we will aim to extend the use of PM techniques beyond discovering techniques to help the modeler validate a model. Indeed, our diff model assists the modeler in checking if the behavior of the simulated model corresponds to the behavior intended by the modeler in the original model. However, the diff model can only highlight mismatches between the two models without checking if the order of sequences of attacks is correct, which, as explained above, is crucial. To ensure that the model's behavior also follows the correct order in simulating the attack on the system, we need to extract all the possible paths allowed from the attack tree. We use these paths to mine a process model, and thanks to the use of conformance checking techniques, we can ensure that the simulated model does not include cases in which the actual behavior differs from that imposed by the attack tree.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Illustration of the input and output generated through the methodology introduced in this paper. The input model undergoes simulation using SMC techniques, and the resulting traces are employed to generate a model. Subsequently, this new model is compared to the original, and a comprehensible output is provided to the modeler, highlighting the discernible differences.</figDesc><graphic coords="2,366.93,156.18,151.29,90.29" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head></head><label></label><figDesc>illustrates the probabilistic attacker behavior in the original RobBank model. The capacity to define various attacker types is beneficial for evaluating</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 2 :Figure 3 :</head><label>23</label><figDesc>Figure 2: Attack-Defence tree RobBank model (Source)</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 4 :Figure 4</head><label>44</label><figDesc>Figure 4: Probabilistic attacker in RisQFLan</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Our methodology combines effectively SMC and PM for automatic white-box behavioral validation -Source [5].</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 6 :Figure 7 :</head><label>67</label><figDesc>Figure 6: Automatic Refinement</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>line 2 Figure 8 :Figure 9 :</head><label>289</label><figDesc>Figure 8: Diff model on the original RobBank model</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Figure 10 :</head><label>10</label><figDesc>Figure 10: Diff model on the refined model</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head></head><label></label><figDesc>. • 5. Automatic diff -The final step involves parsing graphical representations of the original RisQFLan model and the mined one to create a diff model, highlighting differences. The diff model includes common edges and nodes in both models colored in black, while edges and nodes unique to one model are highlighted in red. Dashed red edges indicate transitions present in the original model but missing in the mined one, suggesting constraints preventing those transitions. Continuous red edges represent transitions only in the mined model, potentially indicating simulator deadlock states or errors. Our methodology identifies and automatically fixes such bugs, providing opportunities to enhance the model beyond classic SMC black-box validation.</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 1</head><label>1</label><figDesc>Numerical results experiments on the original RobBank model</figDesc><table><row><cell>Property</cell><cell cols="9">RobBank OpenVault BlowUp LearnCombo GetToVault FindCode1 FindCode2 FindCode3 LockDown</cell></row><row><cell>Probability</cell><cell>0.19</cell><cell>0.14</cell><cell>0.11</cell><cell>0.44</cell><cell>0.47</cell><cell>1</cell><cell>0.16</cell><cell>0.37</cell><cell>0.0</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>Table 2</head><label>2</label><figDesc>Numerical results experiments on the refined RobBank model</figDesc><table><row><cell cols="2">Property</cell><cell cols="9">RobBank OpenVault BlowUp LearnCombo GetToVault FindCode1 FindCode2 FindCode3 LockDown</cell></row><row><cell cols="2">Probability</cell><cell></cell><cell>0.45</cell><cell>0.58</cell><cell></cell><cell>0.07</cell><cell cols="2">0.58</cell><cell>0.80</cell><cell>1</cell><cell>0.2</cell><cell>0.44</cell><cell>0.0</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>Start</cell></row><row><cell></cell><cell></cell><cell></cell><cell>choose</cell><cell cols="2">add(OpenVault)</cell><cell>fail(OpenVault)</cell><cell>tryAction</cell><cell>tryGTV</cell><cell>add(GetToVault) fail(GetToVault)</cell><cell>choose</cell><cell>add(BlowUp) fail(BlowUp) goBack</cell><cell>add(RobBank) fail(RobBank)</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell cols="2">TryOpenVault</cell><cell></cell><cell></cell><cell cols="2">TryGetToVault</cell><cell>TryBlowUp</cell><cell>Complete</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell>tryAction</cell><cell cols="3">add(LearnCombo) fail(LearnCombo)</cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell cols="2">TryLearnCombo</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>tryAction</cell><cell cols="2">add(FindCode1)</cell><cell>fail(FindCode1)</cell><cell cols="6">add(FindCode2) fail(FindCode2) add(FindCode3) fail(FindCode3) goBack</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell cols="2">TryFindCode</cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0"> Figure 9  is the preview of the new attacker behavior model created with our automatic tool.</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Quantitative security risk modeling and analysis with RisQFLan</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">H</forename><surname>Beek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Legay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">L</forename><surname>Lafuente</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vandin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computers &amp; Security</title>
		<imprint>
			<biblScope unit="volume">109</biblScope>
			<biblScope unit="page">102381</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">A survey of statistical model checking</title>
		<author>
			<persName><forename type="first">G</forename><surname>Agha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Palmskog</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Trans. Model. Comp. Simul</title>
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page">39</biblScope>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Probabilistic verification for &quot;black-box&quot; systems</title>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">L</forename><surname>Younes</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CAV 2015</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="253" to="265" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Process mining meets statistical model checking: Towards a novel approach to model validation and enhancement</title>
		<author>
			<persName><forename type="first">R</forename><surname>Casaluce</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Burattin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Chiaromonte</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vandin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Business Process Management Workshops</title>
				<editor>
			<persName><forename type="first">C</forename><surname>Cabanillas</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">N</forename><forename type="middle">F</forename><surname>Garmann-Johnsen</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Koschmider</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="243" to="256" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">White-box validation of quantitative product lines by statistical model checking and process mining</title>
		<author>
			<persName><forename type="first">R</forename><surname>Casaluce</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Burattin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Chiaromonte</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">L</forename><surname>Lafuente</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vandin</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.jss.2024.111983</idno>
		<ptr target="https://doi.org/10.1016/j.jss.2024.111983" />
	</analytic>
	<monogr>
		<title level="j">Journal of Systems and Software</title>
		<imprint>
			<biblScope unit="volume">210</biblScope>
			<biblScope unit="page">111983</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<title level="m">Process Mining</title>
				<meeting>ess Mining</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
	<note>2nd ed.</note>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Threat modelling and beyond-novel approaches to cyber secure the smart energy system</title>
		<author>
			<persName><forename type="first">H</forename><surname>Vallant</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Stojanović</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Božić</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Hofer-Schmitz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Applied Sciences</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="page">5149</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Analyzing the impact of cyberattacks on industrial control systems using timed automata</title>
		<author>
			<persName><forename type="first">A</forename><surname>Jawad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Jaskolka</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE 21st international conference on software quality, reliability and security (QRS), IEEE</title>
				<imprint>
			<date type="published" when="2021">2021. 2021</date>
			<biblScope unit="page" from="966" to="977" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Cybersecurity analysis via process mining: A systematic literature review</title>
		<author>
			<persName><forename type="first">M</forename><surname>Macak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Daubner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">F</forename><surname>Sani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Buhnova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Advanced Data Mining and Applications</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="393" to="407" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title level="m" type="main">QFLan: A Tool for the Quantitative Analysis of Highly Reconfigurable Systems</title>
		<author>
			<persName><forename type="first">A</forename><surname>Vandin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">H</forename><surname>Beek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Legay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Lluch-Lafuente</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2018">2018</date>
			<pubPlace>FM</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">A Framework for Quantitative Modeling and Analysis of Highly (Re)configurable Systems</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">H</forename><surname>Beek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Legay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Lluch-Lafuente</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vandin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. Software Eng</title>
		<imprint>
			<biblScope unit="volume">46</biblScope>
			<biblScope unit="page" from="321" to="345" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Statistical analysis of probabilistic models of software product lines with quantitative constraints</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">H</forename><surname>Beek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Legay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Lluch-Lafuente</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vandin</surname></persName>
		</author>
		<idno type="DOI">10.1145/2791060.2791087</idno>
		<idno>doi:10.1145/ 2791060.2791087</idno>
		<ptr target="https://doi.org/10.1145/2791060.2791087" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 19th International Conference on Software Product Line, SPLC 2015</title>
				<editor>
			<persName><forename type="first">D</forename><forename type="middle">C</forename><surname>Schmidt</surname></persName>
		</editor>
		<meeting>the 19th International Conference on Software Product Line, SPLC 2015<address><addrLine>Nashville, TN, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2015">July 20-24, 2015. 2015</date>
			<biblScope unit="page" from="11" to="15" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Automated and distributed statistical analysis of economic agent-based models</title>
		<author>
			<persName><forename type="first">A</forename><surname>Vandin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Giachini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Lamperti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Chiaromonte</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Economic Dynamics and Control</title>
		<imprint>
			<biblScope unit="page">104458</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<idno>TR-IST-049</idno>
		<title level="m">Improving Common Security Risk Analysis report</title>
				<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
		<respStmt>
			<orgName>Research and Technology Organisation of NATO</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">RTO Technical Report</note>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title/>
		<ptr target="https://bit.ly/3NJjs07" />
	</analytic>
	<monogr>
		<title level="j">U.S. Department of Defense, Defense Acquisition Guidebook</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">5</biblScope>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Fault-tolerant cooperative navigation of networked uav swarms for forest fire monitoring</title>
		<author>
			<persName><forename type="first">J</forename><surname>Hu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Niu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Carrasco</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Lennox</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Arvin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Aerospace Science and Technology</title>
		<imprint>
			<biblScope unit="volume">123</biblScope>
			<biblScope unit="page">107494</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><surname>Gilmore</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Tribastone</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vandin</surname></persName>
		</author>
		<title level="m">An analysis pathway for the quantitative evaluation of public transport systems</title>
				<imprint>
			<publisher>IFM</publisher>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">A tool-chain for statistical spatiotemporal model checking of bike sharing systems</title>
		<author>
			<persName><forename type="first">V</forename><surname>Ciancia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Latella</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Massink</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Paškauskas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vandin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ISOLA&apos;17</title>
				<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Formal analysis of lending pools in decentralized finance</title>
		<author>
			<persName><forename type="first">M</forename><surname>Bartoletti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">H</forename><surname>Chiang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Junttila</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Lluch-Lafuente</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Mirelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vandin</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-031-19759-8_21</idno>
		<idno>doi:</idno>
		<ptr target="10.1007/978-3-031-19759-8\_21" />
	</analytic>
	<monogr>
		<title level="m">Leveraging Applications of Formal Methods, Verification and Validation. Adaptation and Learning -11th International Symposium, ISoLA 2022</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">T</forename><surname>Margaria</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><surname>Steffen</surname></persName>
		</editor>
		<meeting><address><addrLine>Rhodes, Greece</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2022">October 22-30, 2022. 2022</date>
			<biblScope unit="volume">13703</biblScope>
			<biblScope unit="page" from="335" to="355" />
		</imprint>
	</monogr>
	<note>Proceedings, Part III</note>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">A formal approach for the analysis of BPMN collaboration models</title>
		<author>
			<persName><forename type="first">F</forename><surname>Corradini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Fornari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Polini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Re</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Tiezzi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vandin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">JSS</title>
		<imprint>
			<biblScope unit="volume">180</biblScope>
			<biblScope unit="page">111007</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Distributed statistical analysis of complex systems modeled through a chemical metaphor</title>
		<author>
			<persName><forename type="first">D</forename><surname>Pianini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sebastio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vandin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">HPCS</title>
		<imprint>
			<biblScope unit="page" from="416" to="423" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Reasoning (on) service component ensembles in rewriting logic</title>
		<author>
			<persName><forename type="first">L</forename><surname>Belzner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>De Nicola</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vandin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Wirsing</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Spec., Alg., and Soft</title>
		<imprint>
			<biblScope unit="page" from="188" to="211" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Process mining with the heuristics mineralgorithm</title>
		<author>
			<persName><forename type="first">A</forename><surname>Weijters</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>De Medeiros</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Tech. Rep. WP</title>
		<imprint>
			<biblScope unit="volume">166</biblScope>
			<biblScope unit="page" from="1" to="34" />
			<date type="published" when="2006">2006</date>
		</imprint>
		<respStmt>
			<orgName>Technische Universiteit Eindhoven</orgName>
		</respStmt>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
