Contextualisation of Data Flow Diagrams for Security Analysis
Authors: Faily, S., Scandariato, R., Shostack, A., Sion, L., Ki-Aries, D.
Journal: Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
Publication Date: 01/01/2020
Volume: 12419 LNCS
Pages: 186-197
eISSN: 1611-3349
ISSN: 0302-9743
DOI: 10.1007/978-3-030-62230-5_10
Abstract:Data flow diagrams (DFDs) are popular for sketching systems for subsequent threat modelling. Their limited semantics make reasoning about them difficult, but enriching them endangers their simplicity and subsequent ease of take up. We present an approach for reasoning about tainted data flows in design-level DFDs by putting them in context with other complementary usability and requirements models. We illustrate our approach using a pilot study, where tainted data flows were identified without any augmentations to either the DFD or its complementary models.
https://eprints.bournemouth.ac.uk/34459/
Source: Scopus
Contextualisation of Data Flow Diagrams for security analysis
Authors: Faily, S., Scandariato, R., Shostack, A., Sion, L., Ki-Aries, D.
Conference: Seventh International Workshop on Graphical Models for Security
Dates: 22/06/2020
Publication Date: 22/06/2020
Publisher: Springer
https://eprints.bournemouth.ac.uk/34459/
Source: Manual
Contextualisation of Data Flow Diagrams for security analysis.
Authors: Faily, S., Scandariato, R., Shostack, A., Sion, L., Ki-Aries, D.
Journal: CoRR
Publication Date: 2020
Volume: abs/2006.04098
https://eprints.bournemouth.ac.uk/34459/
Source: DBLP
Contextualisation of Data Flow Diagrams for security analysis
Authors: Faily, S., Scandariato, R., Shostack, A., Sion, L., Ki-Aries, D.
Publication Date: 07/06/2020
Abstract:Data flow diagrams (DFDs) are popular for sketching systems for subsequent threat modelling. Their limited semantics make reasoning about them difficult, but enriching them endangers their simplicity and subsequent ease of take up. We present an approach for reasoning about tainted data flows in design-level DFDs by putting them in context with other complementary usability and requirements models. We illustrate our approach using a pilot study, where tainted data flows were identified without any augmentations to either the DFD or its complementary models.
https://eprints.bournemouth.ac.uk/34459/
Source: arXiv