2018
DOI: 10.1007/978-3-030-00761-4_23
|View full text |Cite
|
Sign up to set email alerts
|

Two Architectural Threat Analysis Techniques Compared

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

5
22
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 24 publications
(27 citation statements)
references
References 17 publications
5
22
0
Order By: Relevance
“…This result is not surprising. Similar measurement of precision and recall have been reported in related empirical studies investigating manual knowledge-based threat analysis techniques, i.e., STRIDE [17,21]. In general, high precision and low recall may be a common trait for techniques that manually analyze software architectures.…”
Section: Resultssupporting
confidence: 67%
See 2 more Smart Citations
“…This result is not surprising. Similar measurement of precision and recall have been reported in related empirical studies investigating manual knowledge-based threat analysis techniques, i.e., STRIDE [17,21]. In general, high precision and low recall may be a common trait for techniques that manually analyze software architectures.…”
Section: Resultssupporting
confidence: 67%
“…Similar measurements of precision and recall have been reported in related empirical studies investigating knowledge-based manual threat analysis techniques, i.e. STRIDE [17,21]. We have found that many participants have expressed doubts when detecting certain security design flaws.…”
Section: Introductionsupporting
confidence: 83%
See 1 more Smart Citation
“…The results of Tuma and Scandariato [29] indicate that a perelement STRIDE threat analysis is more effective than a per-interaction based one, so we focus on the elements as assets rather than the interactions. Therefore, all elements in the DFD are assets.…”
Section: Item Definition and Asset Identificationmentioning
confidence: 99%
“…For instance, STRIDE is a well-known threat analysis technique that is also used in the automotive domain. This technique has the tendency to produce a high volume of threats [15,19]. Many threats are later-on discarded due to a low risk value (a combination of impact and likelihood).…”
Section: Introductionmentioning
confidence: 99%