2021
DOI: 10.1007/s10270-021-00941-7
|View full text |Cite
|
Sign up to set email alerts
|

A descriptive study of assumptions in STRIDE security threat modeling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 34 publications
0
5
0
Order By: Relevance
“…1: The four-step framework for threat modelling techniques issue of modelling with the STRIDE is that as the system's complexity grows, so does the number of threats. Another drawback of STRIDE is that it cannot guarantee to model the system's data privacy threats [31].…”
Section: Stride Is a Model-based Threat Modelling Technique Developed...mentioning
confidence: 99%
“…1: The four-step framework for threat modelling techniques issue of modelling with the STRIDE is that as the system's complexity grows, so does the number of threats. Another drawback of STRIDE is that it cannot guarantee to model the system's data privacy threats [31].…”
Section: Stride Is a Model-based Threat Modelling Technique Developed...mentioning
confidence: 99%
“…Assumptions are often implicit and dynamic in nature (i.e., they can be invalidated and modified as the project evolves). Van Landuyt and Joosen [40] find that the majority of assumptions (created by students during STRIDE) were used to either justify an existence of threats or are used to eliminate threats. In [40] a substantial subset (78%) of the assumptions was in direct reference to security-related concepts (i.e., security assumptions), however also domain assumptions (statements about component functionalities) were made.…”
Section: Independentmentioning
confidence: 99%
“…Van Landuyt and Joosen [40] find that the majority of assumptions (created by students during STRIDE) were used to either justify an existence of threats or are used to eliminate threats. In [40] a substantial subset (78%) of the assumptions was in direct reference to security-related concepts (i.e., security assumptions), however also domain assumptions (statements about component functionalities) were made. Thus, we are interested to investigate the effect of diversity dimensions on the type of assumptions.…”
Section: Independentmentioning
confidence: 99%
See 1 more Smart Citation
“…They can be identified when the diagram is built and they can arise during the analysis. Landuyt [49] defines threat assumptions as information used to hypothesise certain system properties that are relevant to the attack identified. Threat assumptions are important in threat analysis as they can be used to justify threat existence and prioritise mitigation efforts.…”
Section: Appendix A: Stride-per-element Vs Per-interactionmentioning
confidence: 99%