Contextualisation of Data Flow Diagrams for Security Analysis
Authors: Faily, S., Scandariato, R., Shostack, A., Sion, L. and Ki-Aries, D.
Journal: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume: 12419 LNCS
Pages: 186-197
eISSN: 1611-3349
ISSN: 0302-9743
DOI: 10.1007/978-3-030-62230-5_10
Abstract:Data flow diagrams (DFDs) are popular for sketching systems for subsequent threat modelling. Their limited semantics make reasoning about them difficult, but enriching them endangers their simplicity and subsequent ease of take up. We present an approach for reasoning about tainted data flows in design-level DFDs by putting them in context with other complementary usability and requirements models. We illustrate our approach using a pilot study, where tainted data flows were identified without any augmentations to either the DFD or its complementary models.
https://eprints.bournemouth.ac.uk/34459/
Source: Scopus
Contextualisation of Data Flow Diagrams for security analysis
Authors: Faily, S., Scandariato, R., Shostack, A., Sion, L. and Ki-Aries, D.
Conference: Seventh International Workshop on Graphical Models for Security
Dates: 22 June 2020
Publisher: Springer
https://eprints.bournemouth.ac.uk/34459/
Source: Manual
Contextualisation of Data Flow Diagrams for security analysis.
Authors: Faily, S., Scandariato, R., Shostack, A., Sion, L. and Ki-Aries, D.
Journal: CoRR
Volume: abs/2006.04098
https://eprints.bournemouth.ac.uk/34459/
Source: DBLP
Contextualisation of Data Flow Diagrams for security analysis
Authors: Faily, S., Scandariato, R., Shostack, A., Sion, L. and Ki-Aries, D.
Abstract:Data flow diagrams (DFDs) are popular for sketching systems for subsequent threat modelling. Their limited semantics make reasoning about them difficult, but enriching them endangers their simplicity and subsequent ease of take up.
We present an approach for reasoning about tainted data flows in design-level DFDs by putting them in context with other complementary usability and requirements models. We illustrate our approach using a pilot study, where tainted data flows were identified without any augmentations to either the DFD or its complementary models.
https://eprints.bournemouth.ac.uk/34459/
Source: arXiv
Contextualisation of Data Flow Diagrams for security analysis
Authors: Faily, S., Scandariato, R., Shostack, A., Sion, L. and Ki-Aries, D.
Journal: arXiv
Issue: 2006.04098v1 [cs.CR
Abstract:Data flow diagrams (DFDs) are popular for sketching systems for subsequent threat modelling. Their limited semantics make reasoning about them difficult, but enriching them endangers their simplicity and subsequent ease of take up. We present an approach for reasoning about tainted data flows in design-level DFDs by putting them in context with other complementary usability and requirements models. We illustrate our approach using a pilot study, where tainted data flows were identified without any augmentations to either the DFD or its complementary models.
https://eprints.bournemouth.ac.uk/34459/
https://arxiv.org/abs/2006.04098
Source: BURO EPrints