Threat Analysis of Software Systems: A Systematic Literature Review K Tuma, G Calikli, R Scandariato Journal of Systems and Software, 2018 | 131 | 2018 |
Flaws in flows: Unveiling design flaws via information flow analysis K Tuma, R Scandariato, M Balliu 2019 IEEE International Conference on Software Architecture (ICSA), 191-200, 2019 | 45 | 2019 |
Automating the early detection of security design flaws K Tuma, L Sion, R Scandariato, K Yskout Proceedings of the 23rd ACM/IEEE International Conference on Model Driven …, 2020 | 41 | 2020 |
Towards security threats that matter K Tuma, R Scandariato, M Widman, C Sandberg Computer Security: ESORICS 2017 International Workshops, CyberICPS 2017 and …, 2018 | 40 | 2018 |
Two architectural threat analysis techniques compared K Tuma, R Scandariato Software Architecture: 12th European Conference on Software Architecture …, 2018 | 30 | 2018 |
Secure data-flow compliance checks between models and code based on automated mappings S Peldszus, K Tuma, D Strüber, J Jürjens, R Scandariato 2019 ACM/IEEE 22nd International Conference on Model Driven Engineering …, 2019 | 23 | 2019 |
Towards automated security design flaw detection L Sion, K Tuma, R Scandariato, K Yskout, W Joosen 2019 34th IEEE/ACM International Conference on Automated Software …, 2019 | 15 | 2019 |
Finding security threats that matter: Two industrial case studies K Tuma, C Sandberg, U Thorsson, M Widman, T Herpel, R Scandariato Journal of Systems and Software 179, 111003, 2021 | 14 | 2021 |
Inspection guidelines to identify security design flaws K Tuma, D Hosseini, K Malamas, R Scandariato Proceedings of the 13th European Conference on Software Architecture-Volume …, 2019 | 12 | 2019 |
Checking security compliance between models and code K Tuma, S Peldszus, D Strüber, R Scandariato, J Jürjens Software and systems modeling 22 (1), 273-296, 2023 | 6 | 2023 |
Seven pain points of threat analysis and risk assessment in the automotive domain K Tuma, M Widman IEEE Security & Privacy 19 (5), 78-82, 2021 | 6 | 2021 |
Precise analysis of purpose limitation in Data Flow Diagrams H Alshareef, K Tuma, S Stucki, G Schneider, R Scandariato Proceedings of the 17th International Conference on Availability …, 2022 | 5 | 2022 |
Towards a Security Stress-Test for Cloud Configurations F Minna, F Massacci, K Tuma 2022 IEEE 15th International Conference on Cloud Computing (CLOUD), 191-196, 2022 | 5 | 2022 |
Back to the Drawing Board S Jasser, K Tuma, R Scandariato, M Riebisch Proceedings of the 4th International Conference on Information Systems …, 2018 | 5 | 2018 |
The role of diversity in cybersecurity risk analysis: An experimental plan K Tuma, R Van Der Lee Proceedings of the Third Workshop on Gender Equality, Diversity, and …, 2022 | 4 | 2022 |
Efficiency and automation in threat analysis of software systems K Tuma PQDT-Global, 2021 | 4 | 2021 |
Finding Security Threats That Matter: An Industrial Case Study K Tuma, C Sandberg, U Thorsson, M Widman, R Scandariato arXiv preprint arXiv:1910.03422, 2019 | 2 | 2019 |
Analyzing and Mitigating (with LLMs) the Security Misconfigurations of Helm Charts from Artifact Hub F Minna, F Massacci, K Tuma arXiv preprint arXiv:2403.09537, 2024 | 1 | 2024 |
Role of Gender in the Evaluation of Security Decisions W Mbaka, K Tuma IEEE Security & Privacy, 2024 | 1 | 2024 |
Impact of gender on the evaluation of security decisions W Mbaka, K Tuma arXiv preprint arXiv:2310.04097, 2023 | 1 | 2023 |