[PDF][PDF] Threat modeling: a summary of available methods

N Shevchenko, TA Chick, P O'Riordan… - Software Engineering …, 2018 - modeler.org.cn
“Threat modeling is the key to a focused defense. Without threat modeling, you can never
stop playing whack-a-mole.”—Adam Shostack [14] Almost all software systems today face a …

Demystifying authentication concepts in smartphones: Ways and types to secure access

S Gupta, A Buriro, B Crispo - Mobile Information Systems, 2018 - Wiley Online Library
Smartphones are the most popular and widespread personal devices. Apart from their
conventional use, that is, calling and texting, they have also been used to perform multiple …

[PDF][PDF] Threat modeling for cyber-physical system-of-systems: Methods evaluation

N Shevchenko, BR Frye… - … Institute: Pittsburgh, PA …, 2018 - insights.sei.cmu.edu
(CPSoS), requires the strategic view of and planning for the whole lifecycle of the system.
For the purpose of this paper, cyber-physical system-of-systems is defined as a system …

Automatic generation of attack scripts from attack graphs

W Nichols, Z Hill, P Hawrylak, J Hale… - 2018 1st International …, 2018 - ieeexplore.ieee.org
While attack graphs are valuable tools for security analysis, their testing and validation is a
time-consuming process. Once validated, the attack graph can be used to generate testing …

[PDF][PDF] Threat Modeling: Evaluation and Recommendations

N Shevchenko, BR Frye, C Woody - Carnegie Mellon Univ. Softw. Eng …, 2018 - apps.dtic.mil
Addressing cybersecurity for а complex system, especially for а cyber-physical system-of-
systems (CPSoS), requires a strategic view of and planning for the whole lifecycle of the …

[PDF][PDF] Butterfly effect: Causality from chaos in the iot

I Agadakos, G Ciocarlie, B Copos… - … Workshop on Security …, 2018 - researchgate.net
The interconnection of devices into networked services and applications is collectively
called the Internet of Things (IoT). Significant efficiencies are gained from this ecosystem that …

Risks and Benefits of Side-Channels in Battlefields

I Agadakos, GF Ciocarlie, B Copos… - 2018 21st …, 2018 - ieeexplore.ieee.org
As networked devices and applications make their way into our battlefields, their behaviors
need to take into account these highly adversarial cyber-physical environments. On the dark …

Generation and analysis of attack graphs on computer networks

A Janse van Rensburg - 2018 - ora.ox.ac.uk
The complexity of computer network attacks requires a sophisticated understanding of
network security. Attackers combine seemingly inconsequential vulnerabilities into …