AttackDefense Framework (ADF): Enhancing IoT Devices and Lifecycles Threat Modeling
Abstract
References
Index Terms
- AttackDefense Framework (ADF): Enhancing IoT Devices and Lifecycles Threat Modeling
Recommendations
Mitigation of SQL Injection Attacks using Threat Modeling
Day after day, SQL Injection (SQLI) attack is consistently proliferating across the globe. According to Open Web Application Security Project (OWASP) Top Ten Cheat Sheet-2014, SQLI is at top in the list of online attacks. The cause of spread of SQLI is ...
Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions
SafeConfig '17: Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber DefenseCurrent threat models typically consider all possible ways an attacker can penetrate a system and assign probabilities to each path according to some metric (e.g. time-to-compromise). In this paper we discuss how this view hinders the realness of both ...
Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets
Design-level vulnerabilities are a major source of security risks in software. To improve trustworthiness of software design, this paper presents a formal threat-driven approach, which explores explicit behaviors of security threats as the mediator ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
![cover image ACM Transactions on Embedded Computing Systems](/cms/asset/84699b2b-7137-43c3-b527-e60dbc5892da/default_cover.png)
Publisher
Association for Computing Machinery
New York, NY, United States
Journal Family
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 319Total Downloads
- Downloads (Last 12 months)319
- Downloads (Last 6 weeks)77
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in