2022
DOI: 10.1109/msec.2021.3125229
|View full text |Cite
|
Sign up to set email alerts
|

Threat Modeling Tools: A Taxonomy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 7 publications
0
7
0
Order By: Relevance
“…Software solutions to help in the analysis process do exist [24] with open source tools available [25] and spreadsheets commonly being used [26]. Graphical tools to assist with a manual analysis include CORAS [12], Microsoft Threat Modeling Tool (TMT) [27], and OWASP Threat Dragon [28].…”
Section: Software Supportmentioning
confidence: 99%
“…Software solutions to help in the analysis process do exist [24] with open source tools available [25] and spreadsheets commonly being used [26]. Graphical tools to assist with a manual analysis include CORAS [12], Microsoft Threat Modeling Tool (TMT) [27], and OWASP Threat Dragon [28].…”
Section: Software Supportmentioning
confidence: 99%
“…The extra context information gained from applying the per-interaction variant makes it the preferred elicitation method for our proposal. Numerous tools [11] exist to apply systematic variants of stride.…”
Section: Threat Modeling Backgroundmentioning
confidence: 99%
“…A recent study [11] compared the most popular threat modeling tools based on several criteria, one of them being the quantification of risk. Except for Threagile [2], all analyzed tools did so based on either predefined values, such as cvss scores, or required a manual analysis by end-users.…”
Section: Related Workmentioning
confidence: 99%
“…According to Shi et al (2021), threat modelling is a systematic process for identifying, evaluating and developing countermeasures to protect critical assets from threats and threat actors. A crucial extension of threat modelling is cyber threat intelligence (Kotsias et al, 2022;Tounsi and Rais, 2018;Shackleford, 2017).…”
Section: Introductionmentioning
confidence: 99%
“…Cyber threat intelligence refers to the process of "acquiring, processing, analysing, and disseminating information that identifies, tracks, and predicts threats, risks, and opportunities inside the cyber domain to offer courses of action that enhance decision making" (Ettinger, 2019). A number of threat models exist, such as STRIDE, DREAD, P.A.S.T.A, Trike, VAST, Attack Tree, Common Vulnerability Scoring System (CVSS), T-MAP and OCTAVE, to assist in identifying vulnerabilities and mitigating potential threats facing networks, computers, software products, and data (Shostack, 2014, Kotsias et al, 2022Shi et al, 2021). However, these models for the most part focus at an organizational level.…”
Section: Introductionmentioning
confidence: 99%