Run-time threat models for systematic and continuous risk assessment

S Verreydt, DV Landuyt, W Joosen - Software and Systems Modeling, 2024 - Springer
Threat modeling involves systematically assessing the likelihood and potential impact of
diverse security threat scenarios. Existing threat modeling approaches and tools act at the …

Development for high-assurance software update management system complying with UN R156

J Seo, J Kwak, S Kim - IEEE Access, 2024 - ieeexplore.ieee.org
With the advent of autonomous driving and connected vehicles in the automotive industry,
various vehicle software components are now connected to wireless networks. This enables …

Checking security compliance between models and code

K Tuma, S Peldszus, D Strüber, R Scandariato… - Software and systems …, 2023 - Springer
It is challenging to verify that the planned security mechanisms are actually implemented in
the software. In the context of model-based development, the implemented security …

Expressive and systematic risk assessments with instance-centric threat models

S Verreydt, D Van Landuyt, W Joosen - Proceedings of the 38th ACM …, 2023 - dl.acm.org
A threat modeling exercise involves systematically assessing the likelihood and potential
impact of diverse threat scenarios. As threat modeling approaches and tools act at the level …

WIP: Consortium Blockchain for Secure Data Acquisition using UAVs as Sensing Devices

T Faika - 2022 IEEE 13th Annual Ubiquitous Computing …, 2022 - ieeexplore.ieee.org
Autonomous inspection and measurement have become an integral part of smart IoT
ecosystem. Low cost mobile and static sensing devices have leveraged the concept of smart …

Pre-deployment Description Logic-based Reasoning for Cloud Infrastructure Security

C Cauli - 2022 - gupea.ub.gu.se
Ensuring the security of a cloud application is exceptionally challenging. Not only is cloud
infrastructure inherently complex, but also a precise definition of what is secure is hard to …