2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2020
DOI: 10.1109/trustcom50675.2020.00073
|View full text |Cite
|
Sign up to set email alerts
|

Asset-Oriented Threat Modeling

Abstract: Threat modeling is recognized as one of the most important activities in software security. It helps to address security issues in software development. Several threat modeling processes are widely used in the industry such as the one of Microsoft SDL. In threat modeling, it is essential to first identify assets before enumerating threats, in order to diagnose the threat targets and spot the protection mechanisms. Asset identification and threat enumeration are collaborative activities involving many actors su… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 20 publications
0
6
0
1
Order By: Relevance
“…The security aspect is suggested to be considered as early as possible in SDLC to prevent potential damages caused by undiscovered vulnerabilities [6]. That is why our focus in this paper is on security requirements.…”
Section: Software Securitymentioning
confidence: 99%
“…The security aspect is suggested to be considered as early as possible in SDLC to prevent potential damages caused by undiscovered vulnerabilities [6]. That is why our focus in this paper is on security requirements.…”
Section: Software Securitymentioning
confidence: 99%
“…Nan Messe, Vanea Chiprianov, Nicolas Belloir, Jamal El-Hachem, Regis Fleurquin and Salah Sadou, in [10], strove to structure the asset identification stage by offering a systematic asset identification process based on a reference model. The authors illustrated the proposed process by example, and demonstrated the usefulness of their process for supporting threat enumeration and improving existing threat-modeling processes, such as Microsoft SDL.…”
Section: Brief Overview Of Used Articlesmentioning
confidence: 99%
“…ThreMA has been designed for modelling complete ICT infrastructures through a formal dictionary shared by all the experts involved in the threat modelling process. In addition, according to [42], a well-defined rule set has been defined for supporting system modelling, in order to prevent misconceptions that could lead to sub-optimal or erroneous threat identification. As it will be seen in the following sections, there is a tight link between how the threat catalog is organised and how the infrastructure components are described.…”
Section: The Threma Approachmentioning
confidence: 99%
“…Particular attention has been placed on representation and organisation of assets. As defined in [42], an asset can be either something valuable for the organisation or everything that may contain vulnerabilities that can be menaced by threats. Hence, not only the stored data, the networks and the digital services must be modelled but, more in general, every device and software connected to the ICT infrastructure that could be the target and/or the vector of possible attacks.…”
Section: B Ict Sub-ontologymentioning
confidence: 99%