Data flow diagrams (DFDs) are popular for sketching systems for subsequent threat modelling. Their limited semantics make reasoning about them difficult, but enriching them endangers their simplicity and subsequent ease of take up. We present an approach for reasoning about tainted data flows in design-level DFDs by putting them in context with other complementary usability and requirements models. We illustrate our approach using a pilot study, where tainted data flows were identified without any augmentations to either the DFD or its complementary models
Privacy, like security, is a non-functional property, yet most software design tools are focused on ...
Despite the abundance of analysis techniques to discover control-flow errors in workflow designs, th...
Taint analysis detects if data coming from a source, such as user input, flows into a sink, such as ...
Data flow diagrams (DFDs) are popular for sketching systems for subsequent threat modelling. Their l...
Data flow diagrams (DFDs) are popular for sketching systems for subsequent threat modelling. Their l...
Data flow diagrams (DFDs) are popular for sketching systems for subsequent threat modelling. Their l...
Threat modelling refers to a number of systematic approaches for eliciting security and/or privacy t...
Data Flow Diagrams (DFDs) are primarily used for modelling functional properties of a system. In rec...
The security of software-intensive systems is frequently attacked. High fines or loss in reputation ...
This paper presents a practical and formal approach to analyze security-centric information flow pol...
This paper presents a practical and formal approach to analyze security-centric information flow pol...
Dataflow diagram is a commonly used tool of structured analysis and design techniques in specificati...
CAIRIS model package to accompany 'Contextualisation of Data Flow Diagrams for security analysis' Gr...
Most software design tools, as for instance Data Flow Diagrams (DFDs), are focused on functional asp...
Threat modelling as part of risk analysis is seen as an essential part of secure systems development...
Privacy, like security, is a non-functional property, yet most software design tools are focused on ...
Despite the abundance of analysis techniques to discover control-flow errors in workflow designs, th...
Taint analysis detects if data coming from a source, such as user input, flows into a sink, such as ...
Data flow diagrams (DFDs) are popular for sketching systems for subsequent threat modelling. Their l...
Data flow diagrams (DFDs) are popular for sketching systems for subsequent threat modelling. Their l...
Data flow diagrams (DFDs) are popular for sketching systems for subsequent threat modelling. Their l...
Threat modelling refers to a number of systematic approaches for eliciting security and/or privacy t...
Data Flow Diagrams (DFDs) are primarily used for modelling functional properties of a system. In rec...
The security of software-intensive systems is frequently attacked. High fines or loss in reputation ...
This paper presents a practical and formal approach to analyze security-centric information flow pol...
This paper presents a practical and formal approach to analyze security-centric information flow pol...
Dataflow diagram is a commonly used tool of structured analysis and design techniques in specificati...
CAIRIS model package to accompany 'Contextualisation of Data Flow Diagrams for security analysis' Gr...
Most software design tools, as for instance Data Flow Diagrams (DFDs), are focused on functional asp...
Threat modelling as part of risk analysis is seen as an essential part of secure systems development...
Privacy, like security, is a non-functional property, yet most software design tools are focused on ...
Despite the abundance of analysis techniques to discover control-flow errors in workflow designs, th...
Taint analysis detects if data coming from a source, such as user input, flows into a sink, such as ...