Proceedings of the 33rd Annual ACM Symposium on Applied Computing 2018
DOI: 10.1145/3167132.3167285
|View full text |Cite
|
Sign up to set email alerts
|

Solution-aware data flow diagrams for security threat modeling

Abstract: Threat modeling refers to a number of systematic approaches for eliciting security and privacy threats. Data Flow Diagrams (DFDs) are the main input for threat modeling techniques such as Microsoft STRIDE or LINDDUN. They represent system-level abstractions that lack any architectural knowledge on existing security solutions. However, this is not how software is built in practice: there are often previously-made security-and privacy-relevant decisions that originate from the technological context or domain, re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
39
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 41 publications
(39 citation statements)
references
References 23 publications
0
39
0
Order By: Relevance
“…This yields a list of threats that is both holistic and specific to the SUT. This can also be extended with security building blocks that refine the threat derivation [7]. The two basic components of a threat model therefore pose an ideal tool to achieve the system modeling for security TCG: the DFD represent an abstraction of the SUT, while the according threat template represent an abstraction of the threats to the system.…”
Section: Threat Modelingmentioning
confidence: 99%
“…This yields a list of threats that is both holistic and specific to the SUT. This can also be extended with security building blocks that refine the threat derivation [7]. The two basic components of a threat model therefore pose an ideal tool to achieve the system modeling for security TCG: the DFD represent an abstraction of the SUT, while the according threat template represent an abstraction of the threats to the system.…”
Section: Threat Modelingmentioning
confidence: 99%
“…This section provides some background information on threat modeling in general, and the previously developed extension [18] we rely on to enable the risk analysis techniques discussed further on. Note that other security or privacy extensions [2,4,21] could be used as well.…”
Section: Background On Threat Modelingmentioning
confidence: 99%
“…Since security solutions are more complex and often span multiple elements, a more extensive representation is used in our approach. We rely on a more expressive representation of security countermeasures as patterns [18]. These patterns specify roles for the DFD elements involved in the pattern and specify the countermeasures that apply security protections to those roles.…”
Section: Security and Privacy Extensionsmentioning
confidence: 99%
See 2 more Smart Citations