
lation, and analysis of software architectures. Their
formal semantics provide a strong foundation for rig-
orous verification of system properties, while their
rich modeling primitives facilitate precise representa-
tion of complex security interactions. Additionally,
we utilize ASK-CTL logic to formally express and
verify security properties. Through this analysis, we
identify several directions for future research. These
include enhancing policy violation detection through
counterexample generation and addressing the state
space explosion problem via optimization techniques,
aiming to support more scalable analyses. These en-
hancements will facilitate the integration of security
design patterns into system architectures, promote au-
tomated vulnerability mitigation, and reinforce re-
silience against evolving cyber threats. By bridging
formal verification with security-aware design, our
approach not only identifies vulnerabilities but also
supports the development of more robust systems.
REFERENCES
Al-Azzoni, I. and Iqbal, S. (2024). Access control verifica-
tion in smart contracts using colored petri nets. Com-
puters, 13(11):274.
Amthor, P. and Rabe, M. (2019). Command dependen-
cies in heuristic safety analysis of access control mod-
els. In International Symposium on Foundations and
Practice of Security, pages 207–224. Springer.
Gowdanakatte, S., Abdelgawad, M., and Ray, I. (2024).
Assets criticality assessment of industrial control sys-
tems: A wind farm case study. In 2024 IEEE 24th
International Conference on Software Quality, Relia-
bility and Security (QRS), pages 352–363. IEEE.
He, Y., Dong, H., Wu, H., and Duan, Q. (2023). Formal
analysis of reentrancy vulnerabilities in smart contract
based on cpn. Electronics, 12(10):2152.
Jensen, K. and Kristensen, L. M. (2009). Formal defini-
tion of hierarchical coloured petri nets. Coloured Petri
Nets: Modelling and Validation of Concurrent Sys-
tems, pages 127–149.
Jensen, K., Kristensen, L. M., and Wells, L. (2007).
Coloured petri nets and cpn tools for modelling
and validation of concurrent systems. International
Journal on Software Tools for Technology Transfer,
9(3):213–254.
Kulik, T., Dongol, B., Larsen, P. G., Macedo, H. D., Schnei-
der, S., Tran-Jørgensen, P. W., and Woodcock, J.
(2022). A survey of practical formal methods for se-
curity. Formal aspects of computing, 34(1):1–39.
OWASP (2024). Application threat modeling.
https://owasp.org/www-community/Threat\
Modeling\ Process. Accessed: 2024-03-17.
Ratzer, A. V., Wells, L., Lassen, H. M., Laursen, M.,
Qvortrup, J. F., Stissing, M. S., Westergaard, M.,
Christensen, S., and Jensen, K. (2003). Cpn tools for
editing, simulating, and analysing coloured petri nets.
In International conference on application and theory
of petri nets, pages 450–462. Springer.
Rouland, Q., Adi, K., Nguena Timo, O., and Logrippo, L.
(2024). Detecting information disclosure vulnerabil-
ity in software architectures using alloy. In 19th Inter-
national Conference on Risks and Security of Internet
and Systems (CRiSIS). Springer.
Simplice, I., Fidel, O., Kennedy, C. G., Okokpujie, K., and
Gabriel, S. (2023). Enhancing information system se-
curity: A vulnerability assessment of a web applica-
tion using owasp top 10 list. In International confer-
ence on smart computing and cyber security: strategic
foresight, security challenges and innovation, pages
385–397. Springer.
Soares, J. A. C. (2017). Automatic model transformation
from uml sequence diagrams to coloured petri nets.
Master’s thesis, Universidade do Porto (Portugal).
Tikhonov, V. and Novikov, V. (2021). Verification of ac-
cess control systems based on modeling with colored
petri nets. High-Tech Technologies in Earth Space Re-
search, 13(6):50–59.
Von Borstel, F. D., Villa-Medina, J. F., and Guti
´
errez, J.
(2022). Development of mobile robots based on wire-
less robotic components using uml and hierarchical
colored petri nets. Journal of Intelligent & Robotic
Systems, 104(4):70.
Wang, P., Liu, S., Liu, A., and Jiang, W. (2024). Detecting
security vulnerabilities with vulnerability nets. Jour-
nal of Systems and Software, 208:111902.
Zhong, W., Zhou, J.-t., and Sun, T. (2023). Concurrent
software fine-coarse-grained automatic modelling by
coloured petri nets for model checking. IET Software,
17(1):55–75.
Zhou, W., Dague, P., Liu, L., Ye, L., and Za
¨
ıdi, F. (2020). A
coloured petri nets based attack tolerance framework.
In 2020 27th Asia-Pacific Software Engineering Con-
ference (APSEC), pages 159–168. IEEE.
SECRYPT 2025 - 22nd International Conference on Security and Cryptography
530