[PDF][PDF] Threat modeling: a summary of available methods
N Shevchenko, TA Chick, P O'Riordan… - Software Engineering …, 2018 - modeler.org.cn
“Threat modeling is the key to a focused defense. Without threat modeling, you can never
stop playing whack-a-mole.”—Adam Shostack [14] Almost all software systems today face a …
stop playing whack-a-mole.”—Adam Shostack [14] Almost all software systems today face a …
Demystifying authentication concepts in smartphones: Ways and types to secure access
Smartphones are the most popular and widespread personal devices. Apart from their
conventional use, that is, calling and texting, they have also been used to perform multiple …
conventional use, that is, calling and texting, they have also been used to perform multiple …
[PDF][PDF] Threat modeling for cyber-physical system-of-systems: Methods evaluation
N Shevchenko, BR Frye… - … Institute: Pittsburgh, PA …, 2018 - insights.sei.cmu.edu
(CPSoS), requires the strategic view of and planning for the whole lifecycle of the system.
For the purpose of this paper, cyber-physical system-of-systems is defined as a system …
For the purpose of this paper, cyber-physical system-of-systems is defined as a system …
Automatic generation of attack scripts from attack graphs
W Nichols, Z Hill, P Hawrylak, J Hale… - 2018 1st International …, 2018 - ieeexplore.ieee.org
While attack graphs are valuable tools for security analysis, their testing and validation is a
time-consuming process. Once validated, the attack graph can be used to generate testing …
time-consuming process. Once validated, the attack graph can be used to generate testing …
[PDF][PDF] Threat Modeling: Evaluation and Recommendations
N Shevchenko, BR Frye, C Woody - Carnegie Mellon Univ. Softw. Eng …, 2018 - apps.dtic.mil
Addressing cybersecurity for а complex system, especially for а cyber-physical system-of-
systems (CPSoS), requires a strategic view of and planning for the whole lifecycle of the …
systems (CPSoS), requires a strategic view of and planning for the whole lifecycle of the …
[PDF][PDF] Butterfly effect: Causality from chaos in the iot
The interconnection of devices into networked services and applications is collectively
called the Internet of Things (IoT). Significant efficiencies are gained from this ecosystem that …
called the Internet of Things (IoT). Significant efficiencies are gained from this ecosystem that …
Risks and Benefits of Side-Channels in Battlefields
As networked devices and applications make their way into our battlefields, their behaviors
need to take into account these highly adversarial cyber-physical environments. On the dark …
need to take into account these highly adversarial cyber-physical environments. On the dark …
Generation and analysis of attack graphs on computer networks
A Janse van Rensburg - 2018 - ora.ox.ac.uk
The complexity of computer network attacks requires a sophisticated understanding of
network security. Attackers combine seemingly inconsequential vulnerabilities into …
network security. Attackers combine seemingly inconsequential vulnerabilities into …