[HTML][HTML] Threat modeling of industrial control systems: A systematic literature review

SM Khalil, H Bahsi, T Korõtko - Computers & Security, 2024 - Elsevier
Threat modeling is the process of identifying and mitigating potential threats to a system. It
was originally developed to enhance software security during the design phase but has …

Privacy champions in software teams: Understanding their motivations, strategies, and challenges

M Tahaei, A Frik, K Vaniea - Proceedings of the 2021 CHI Conference …, 2021 - dl.acm.org
Software development teams are responsible for making and implementing software design
decisions that directly impact end-user privacy, a challenging task to do well. Privacy …

Adopting threat modelling in agile software development projects

K Bernsmed, DS Cruzes, MG Jaatun, M Iovan - Journal of Systems and …, 2022 - Elsevier
The goal of secure software engineering is to create software that keeps performing as
intended, even when exposed to attacks. Threat modelling is considered to be a key activity …

A systematic review and analytical evaluation of security requirements engineering approaches

MN Anwar Mohammad, M Nazir, K Mustafa - Arabian Journal for Science …, 2019 - Springer
Security is an inevitable concern in today's scenario of software-based application's
pervasiveness and development practices. Researchers and practitioners frequently …

Automating the early detection of security design flaws

K Tuma, L Sion, R Scandariato, K Yskout - Proceedings of the 23rd ACM …, 2020 - dl.acm.org
Security by design is a key principle for realizing secure software systems and it is advised
to hunt for security flaws from the very early stages of development. At design-time, security …

Automated risk management based software security vulnerabilities management

RR Althar, D Samanta, M Kaur, D Singh, HN Lee - IEEE Access, 2022 - ieeexplore.ieee.org
An automated risk assessment approach is explored in this work. The focus is to optimize
the conventional threat modeling approach to explore software system vulnerabilities. Data …

[HTML][HTML] Continuous software security through security prioritisation meetings

IA Tøndel, DS Cruzes - Journal of Systems and Software, 2022 - Elsevier
Software security needs to be a continuous endeavour in current software development
practices. Frequent software updates, paired with an ongoing flow of security breaches …

Threat modelling and agile software development: Identified practice in four Norwegian organisations

K Bernsmed, MG Jaatun - … on Cyber Security and Protection of …, 2019 - ieeexplore.ieee.org
Threat modelling is considered a key activity in secure software engineering. However,
despite its documented benefits it has not (yet) been widely adopted by agile software …

Threat modeling state of practice in Dutch organizations

S Verreydt, K Yskout, L Sion, W Joosen - Twentieth Symposium on …, 2024 - usenix.org
Threat modeling is a key technique to apply a security by design mindset, allowing the
systematic identification of security and privacy threats based on design-level abstractions of …

Security risk assessment and management as technical debt

K Rindell, J Holvitie - … on Cyber Security and Protection of …, 2019 - ieeexplore.ieee.org
The endeavor to achieving software security consists of a set of risk-based security
engineering processes during software development. In iterative software development, the …