Contextualisation of Data Flow Diagrams for Security Analysis

Authors: Faily, S., Scandariato, R., Shostack, A., Sion, L. and Ki-Aries, D.

Journal: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Volume: 12419 LNCS

Pages: 186-197

eISSN: 1611-3349

ISSN: 0302-9743

DOI: 10.1007/978-3-030-62230-5_10

Abstract:

Data flow diagrams (DFDs) are popular for sketching systems for subsequent threat modelling. Their limited semantics make reasoning about them difficult, but enriching them endangers their simplicity and subsequent ease of take up. We present an approach for reasoning about tainted data flows in design-level DFDs by putting them in context with other complementary usability and requirements models. We illustrate our approach using a pilot study, where tainted data flows were identified without any augmentations to either the DFD or its complementary models.

https://eprints.bournemouth.ac.uk/34459/

Source: Scopus

Contextualisation of Data Flow Diagrams for security analysis

Authors: Faily, S., Scandariato, R., Shostack, A., Sion, L. and Ki-Aries, D.

Conference: Seventh International Workshop on Graphical Models for Security

Dates: 22 June 2020

Publisher: Springer

https://eprints.bournemouth.ac.uk/34459/

Source: Manual

Contextualisation of Data Flow Diagrams for security analysis.

Authors: Faily, S., Scandariato, R., Shostack, A., Sion, L. and Ki-Aries, D.

Journal: CoRR

Volume: abs/2006.04098

https://eprints.bournemouth.ac.uk/34459/

Source: DBLP

Contextualisation of Data Flow Diagrams for security analysis

Authors: Faily, S., Scandariato, R., Shostack, A., Sion, L. and Ki-Aries, D.

Abstract:

Data flow diagrams (DFDs) are popular for sketching systems for subsequent threat modelling. Their limited semantics make reasoning about them difficult, but enriching them endangers their simplicity and subsequent ease of take up.

We present an approach for reasoning about tainted data flows in design-level DFDs by putting them in context with other complementary usability and requirements models. We illustrate our approach using a pilot study, where tainted data flows were identified without any augmentations to either the DFD or its complementary models.

https://eprints.bournemouth.ac.uk/34459/

Source: arXiv

Contextualisation of Data Flow Diagrams for security analysis

Authors: Faily, S., Scandariato, R., Shostack, A., Sion, L. and Ki-Aries, D.

Journal: arXiv

Issue: 2006.04098v1 [cs.CR

Abstract:

Data flow diagrams (DFDs) are popular for sketching systems for subsequent threat modelling. Their limited semantics make reasoning about them difficult, but enriching them endangers their simplicity and subsequent ease of take up. We present an approach for reasoning about tainted data flows in design-level DFDs by putting them in context with other complementary usability and requirements models. We illustrate our approach using a pilot study, where tainted data flows were identified without any augmentations to either the DFD or its complementary models.

https://eprints.bournemouth.ac.uk/34459/

https://arxiv.org/abs/2006.04098

Source: BURO EPrints