Writing Secure Code
Documenting Software Architectures: Views and Beyond
Documenting Software Architectures: Views and Beyond
Software Reflexion Models: Bridging the Gap between Design and Implementation
IEEE Transactions on Software Engineering
Threat Modeling
Demystifying the Threat-Modeling Process
IEEE Security and Privacy
The Security Development Lifecycle
The Security Development Lifecycle
Analyzing security architectures
Proceedings of the IEEE/ACM international conference on Automated software engineering
Hi-index | 0.00 |
Threat modeling is a lightweight approach to reason about application security and uses Data Flow Diagrams (DFDs) with security annotations. We extended Reflexion Models to check the conformance of an as-designed DFD with an approximation of the as-built DFD obtained from the implementation. We also designed a set of properties and an analysis to help novice designers think about security threats such as spoofing, tampering and information disclosure.