STRIDE threat model-based framework for assessing the vulnerabilities of modern vehicles

Z Abuabed, A Alsadeh, A Taweel - Computers & Security, 2023‏ - Elsevier
Modern automobiles are becoming increasingly sophisticated with enhanced features.
Modern car systems have hundreds of millions of lines of code, which increase the attack …

Threat modeling and assessment methods in the healthcare-IT system: a critical review and systematic evaluation

M Aijaz, M Nazir, MNA Mohammad - SN Computer Science, 2023‏ - Springer
In recent years, the healthcare-IT systems have undergone numerous technological
advancements. With the advent of implanted medical devices, the ubiquitous health is …

Automatic extraction of security-rich dataflow diagrams for microservice applications written in Java

S Schneider, R Scandariato - Journal of Systems and Software, 2023‏ - Elsevier
Dataflow diagrams (DFDs) are a valuable asset for securing applications, as they are the
starting point for many security assessment techniques. Their creation, however, is often …

Threat assessment and risk analysis (TARA) for interoperable medical devices in the operating room inspired by the automotive industry

A Puder, J Henle, E Sax - Healthcare, 2023‏ - mdpi.com
Prevailing trends in the automotive and medical device industry, such as life cycle
overarching configurability, connectivity, and automation, require an adaption of …

Security Modelling for Cyber-Physical Systems: A Systematic Literature Review

S Huang, CM Poskitt, LK Shar - arxiv preprint arxiv:2404.07527, 2024‏ - arxiv.org
Cyber-physical systems (CPS) are at the intersection of digital technology and engineering
domains, rendering them high-value targets of sophisticated and well-funded cybersecurity …

[HTML][HTML] Threat modeling of a smart grid secondary substation

F Holik, LH Flå, MG Jaatun, SY Yayilgan, J Foros - Electronics, 2022‏ - mdpi.com
A full smart grid implementation requires the digitization of all parts of the smart grid
infrastructure, including secondary electrical substations. Unfortunately, this introduces new …

Security threats analysis of the unmanned aerial vehicle system

RH Jacobsen, A Marandi - MILCOM 2021-2021 IEEE Military …, 2021‏ - ieeexplore.ieee.org
Autonomous Unmanned Aerial Vehicles (UAVs) find increasing use in the civil airspace
where multi-UAV systems are deployed to perform operations supervised by remote control …

How dataflow diagrams impact software security analysis: an empirical experiment

S Schneider, NED Ferreyra, PJ Queval… - … on Software Analysis …, 2024‏ - ieeexplore.ieee.org
Models of software systems are used throughout the software development lifecycle.
Dataflow diagrams (DFDs), in particular, are well-established resources for security analysis …

Run-time threat models for systematic and continuous risk assessment

S Verreydt, DV Landuyt, W Joosen - Software and Systems Modeling, 2024‏ - Springer
Threat modeling involves systematically assessing the likelihood and potential impact of
diverse security threat scenarios. Existing threat modeling approaches and tools act at the …

[PDF][PDF] A Unified Model to Detect Information Flow and Access Control Violations in Software Architectures.

S Seifermann, R Heinrich, D Werle, RH Reussner - SECRYPT, 2021‏ - scitepress.org
Software architectures allow identifying confidentiality issues early and in a cost-efficient
way. Information Flow (IF) and Access Control (AC) are established confidentiality …