2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) 2018
DOI: 10.1109/eurospw.2018.00017
|View full text |Cite
|
Sign up to set email alerts
|

Interaction-Based Privacy Threat Elicitation

Abstract: Threat modeling involves the systematic identification, elicitation, and analysis of privacy-and/or security-related threats in the context of a specific system. These modeling practices are performed at a specific level of architectural abstraction -the use of Data Flow Diagram (DFD) models, for example, is common in this context.To identify and elicit threats, two fundamentally different approaches can be taken: (1) elicitation on a per-element basis involves iteratively singling out individual architectural… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
3

Relationship

3
6

Authors

Journals

citations
Cited by 25 publications
(26 citation statements)
references
References 10 publications
0
26
0
Order By: Relevance
“…There are two main approaches. The original per-element approach [2], [4] iterates systematically over each element of the model, while the per-interaction approach [3], [14] considers each interaction (i.e. sender-flow-destination combination) in the model.…”
Section: Threat Modelingmentioning
confidence: 99%
“…There are two main approaches. The original per-element approach [2], [4] iterates systematically over each element of the model, while the per-interaction approach [3], [14] considers each interaction (i.e. sender-flow-destination combination) in the model.…”
Section: Threat Modelingmentioning
confidence: 99%
“…A final common class of design-level analysis approaches for security is threat modeling, which starts from a data flow diagram-based abstraction of the system to elicit security [10], [19] or privacy [21], [37] threats. Both the security and privacy threat modeling approaches support a systematic analysis of the system under consideration by iterating over every element (element-based [10], [19], [37]) or interaction (interactionbased [19], [38]). The knowledge-bases used in these approaches can also be extended for detecting additional threat types, but the element-or interaction-based approach limits the complexity of the criteria to assess as they remain limited to a single element or interaction.…”
Section: Related Workmentioning
confidence: 99%
“…Privacy by Design (PbD) [27] is a fairly new system that works to embed privacy practice more deeply and effectively into the development process [30,59]. REGULATION (EU) 2016/679 General Data Protection Regulation (GDPR) [1] confirms the importance of this and is applicable to all systems that manage personal data processing -a common feature of IoT applications.…”
Section: Introductionmentioning
confidence: 99%