2019
DOI: 10.1080/19361610.2019.1545278
|View full text |Cite
|
Sign up to set email alerts
|

Threat Modeling of Internet of Things Health Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 29 publications
(15 citation statements)
references
References 12 publications
0
12
0
1
Order By: Relevance
“…In combination with STRIDE, it is used to assess the risk and to provide mitigations and countermeasures. A similar approach is proposed by Reference [149], which describes a system aimed to represent the vulnerabilities and attacks identified through STRIDE and ranked with DREAD. Another work that uses an existing approach is Reference [10], which applies OCTAVE to the smart-home domain by identifying risks and providing countermeasures specific for this domain.…”
Section: Risk Assessment: Analysis and Applicability To The Iot Contextmentioning
confidence: 99%
“…In combination with STRIDE, it is used to assess the risk and to provide mitigations and countermeasures. A similar approach is proposed by Reference [149], which describes a system aimed to represent the vulnerabilities and attacks identified through STRIDE and ranked with DREAD. Another work that uses an existing approach is Reference [10], which applies OCTAVE to the smart-home domain by identifying risks and providing countermeasures specific for this domain.…”
Section: Risk Assessment: Analysis and Applicability To The Iot Contextmentioning
confidence: 99%
“…While threats may arise from both accidental and deliberate activities of "legitimate users" (the owner/account holder of a device; Omotosho, Haruna, & Olaniyi, 2019), we assume that an IPV threat actor may be a perpetrator who intentionally abuses specific technical features to monitor, control, or coerce a victim/survivor. Thus, the perpetrator may be an authorized user yet still abuses the system for illegitimate means.…”
Section: A Methods To Threat Model Intimate Partner Violence Tech Abusementioning
confidence: 99%
“…For another, investigating a single device over an assembled system allows for vulnerabilities to pass through undetected (J. R. C. Nurse, Creese, & Roure, 2017). While we accept that one must account for the entire IoT "ecosystem" (Aufner, 2020;Omotosho et al, 2019;Seeam, Ogbeh, Guness, & Bellekens, 2019), a broader investigation is beyond the scope of this chapter.…”
Section: Threat Modeling a Smart Internet-connected Lockmentioning
confidence: 99%
“…1. Although DREAD is an asset-centric threat modelling approach, several of its application in the literature is in combination with STRIDE (spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privilege) model [8], [9], [10], [11], [12]. In this type of approach, the DREAD scoring scheme is used to identify the likelihood that an attack is able to exploit a particular threat.…”
Section: A Dreadmentioning
confidence: 99%