Challenges and experiences with applying microsoft threat modeling in agile development projects

DS Cruzes, MG Jaatun, K Bernsmed… - 2018 25th …, 2018 - ieeexplore.ieee.org
The goal of secure software engineering is to create software that keeps performing as
intended even when exposed to attacks. Threat modeling is considered to be a key activity …

Adopting threat modelling in agile software development projects

K Bernsmed, DS Cruzes, MG Jaatun, M Iovan - Journal of Systems and …, 2022 - Elsevier
The goal of secure software engineering is to create software that keeps performing as
intended, even when exposed to attacks. Threat modelling is considered to be a key activity …

Activity-driven clock design for low power circuits

GE Téllez, A Farrahi… - Proceedings of IEEE …, 1995 - ieeexplore.ieee.org
In this paper we investigate activity-driven clock trees to reduce the dynamic power
consumption of synchronous digital CMOS circuits. Sections of an activity-driven clock tree …

Engineering security into distributed systems: A survey of methodologies

A Uzunov, E Fernandez, K Falkner - 2012 - hekyll.services.adelaide.edu.au
Rapid technological advances in recent years have precipitated a general shift towards
software distribution as a central computing paradigm. This has been accompanied by a …

Eliciting security requirements through misuse activities

FA Braz, EB Fernandez… - 2008 19th International …, 2008 - ieeexplore.ieee.org
In previous work we introduced an approach for finding security requirements based on
misuse activities (actions). This method starts from the activity diagram of a use case (or a …

[PDF][PDF] International journal of advanced research in computer science and software engineering

AB Angadi, AB Angadi, KC Gull - International Journal, 2013 - academia.edu
Relational database management systems (RDMBSs) today are the predominant
technology for storing. In the past few years, the” one size fits all “-thinking concerning …

Collaborative security risk estimation in agile software development

IA Tøndel, MG Jaatun, DS Cruzes… - Information & Computer …, 2019 - emerald.com
Purpose Today, agile software development teams in general do not adopt security risk-
assessment practices in an ongoing manner to prioritize security work. Protection Poker is a …

Threat modeling of AMI

IA Tøndel, MG Jaatun, MB Line - … 17-18, 2012, Revised Selected Papers, 2013 - Springer
The introduction of an advanced metering infrastructure (AMI) into the power grid forces the
power industry to address information security threats and consumer privacy more …

Threat modeling in agile software development

MG Jaatun, K Bernsmed, DS Cruzes… - Exploring Security in …, 2019 - igi-global.com
Threat modeling is a way to get an overview of possible attacks against your systems. The
advantages of threat modeling include tackling security problems early, improved risk …

So {U} R CERER: Developer-Driven Security Testing Framework for Android Apps

MS Rahman, B Kojusner, R Kennedy… - 2021 36th IEEE/ACM …, 2021 - ieeexplore.ieee.org
Frequently advised secure development recommendations often fall short in practice for app
developers. Tool-driven (eg, using static analysis tools) approaches lack context and …