TAM2: automated threat analysis

  • Authors:
  • Andreas Schaad;Mike Borozdin

  • Affiliations:
  • SAP Research, Karlsruhe, Germany;University of Trento, Povo, Italy

  • Venue:
  • Proceedings of the 27th Annual ACM Symposium on Applied Computing
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Identifying and resolving security problems as early as possible in the software development life cycle should by now be conventional wisdom. However, we observe that there is no threat modeling approach suitable for analysing initial software architecture. Our approach aims to fill this gap by adopting a threat modeling technique (STRIDE) that can be equally applied to software architecture diagrams. Accordingly, we claim and seek to validate that even little additional information on architecture diagrams can yield significant value in a lightweight automated security analysis. We implement and verify our approach by building a tool for automated threat analysis of software architecture diagrams. This is validated in the context of a large-scale industrial software development context providing some initial empirical analysis.