2023
DOI: 10.1007/s11219-023-09634-4
|View full text |Cite
|
Sign up to set email alerts
|

Systematic analysis of automated threat modelling techniques: Comparison of open-source tools

Abstract: Companies face increasing pressure to protect themselves and their customers from security threats. Security by design is a proactive approach that builds security into all aspects of a system from the ground up, rather than adding it on as an afterthought. By taking security into account at every stage of development, organizations can create systems that are more resistant to attacks and better able to recover from them if they do occur. One of the most relevant practices is threat modelling, i.e. the proces… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 64 publications
0
1
0
1
Order By: Relevance
“…Software solutions to help in the analysis process do exist [24] with open source tools available [25] and spreadsheets commonly being used [26]. Graphical tools to assist with a manual analysis include CORAS [12], Microsoft Threat Modeling Tool (TMT) [27], and OWASP Threat Dragon [28].…”
Section: Software Supportmentioning
confidence: 99%
“…Software solutions to help in the analysis process do exist [24] with open source tools available [25] and spreadsheets commonly being used [26]. Graphical tools to assist with a manual analysis include CORAS [12], Microsoft Threat Modeling Tool (TMT) [27], and OWASP Threat Dragon [28].…”
Section: Software Supportmentioning
confidence: 99%
“…Em [Granata and Rak 2023] é apresentada uma revisão sistemática da literatura sobre técnicas de automac ¸ão de modelagem de ameac ¸as. A partir de uma análise sistemática das pesquisas acadêmicas nos repositórios de publicac ¸ão, foram selecionadas quatro ferramentas de código aberto para comparac ¸ão: Microsoft TMT 3 , OWASP Threat Dragon 4 , SLA-generator 5 e PyTM 6 .…”
Section: Trabalhos Relacionadosunclassified