[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2885990.2885999acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfoseccdConference Proceedingsconference-collections
abstract

Evaluating the effectiveness of Microsoft threat modeling tool

Published: 10 October 2015 Publication History

Abstract

Today, it is widely accepted that software security best practices need to be integrated into all the stages of the software development life cycle (SDLC). This is because software applications are constantly being exposed to malicious attacks by hackers. One of the best practices for software security is threat modeling. It is essential for software security in the design stage of the SDLC and can help to reduce software design flaws significantly before the software application is implemented. The topics of threat modeling and the SDLC threat modeling tool were introduced to graduate students in a secure software engineering course. The effectiveness of Microsoft's Threat Modeling Tool was evaluated through a course assignment that included two parts: A) threat modeling using a manual process and B) threat modeling using Microsoft's 2014 threat modeling tool. This paper presents the results of the evaluation of the tool in assisting non-experts, students, in conducting an architectural risk analysis on a mock online shopping web application.

References

[1]
McGraw, G., & Viega, J. (2001). Building Secure Software. Addison Wesley.
[2]
McGraw, G. Software Security. IEEE Security & Privacy. 2004
[3]
M. Howard. Building more secure software with improved development process. IEEE Security & Privacy, 2(6):63--65, 2004.
[4]
Ardi, Shanai, et al. "How can the developer benefit from security modeling?" Availability, Reliability and Security, 2007. ARES 2007. The Second International Conference on. IEEE, 2007.
[5]
Möckel, Caroline, and Ali E. Abdallah. "Threat modeling approaches and tools for securing architectural designs of an e-banking application." Information Assurance and Security (IAS), 2010 Sixth International Conference on. IEEE, 2010.
[6]
AlBreiki, Hamda Hasan, and Qusay H. Mahmoud. "Evaluation of static analysis tools for software security." In Innovations in Information Technology (INNOVATIONS), 2014 10th International Conference on, pp. 93--98. IEEE, 2014.
[7]
Chapter 3 Threat Modeling, retrieved on March 20, 2015 from http://msdn.microsoft.com/en-us/library/ff648644.aspx
[8]
Uncover Security Design Flaws Using The STRIDE Approach, retrieved on March 20, 2015 from http://msdn.microsoft.com/en-s/magazine/cc163519.aspx#S3
[9]
McGraw, Gary. Software Security: Building Security In. 1st edition. Addison-Wesley Professional, 2006, pp. 150--179
[10]
Threat Modeling Tool 2014 Demo, retrieved from https://www.youtube.com/watch?v=G2reie1skGg

Cited By

View all
  • (2025)ZeroVCS: An efficient authentication protocol without trusted authority for zero-trust vehicular communication systemsFuture Generation Computer Systems10.1016/j.future.2024.107520163(107520)Online publication date: Feb-2025
  • (2024)"I'm Getting Information that I Can Act on Now": Exploring the Level of Actionable Information in Tool-generated Threat ReportsProceedings of the 2024 European Symposium on Usable Security10.1145/3688459.3688467(172-186)Online publication date: 30-Sep-2024
  • (2024)Exploring Medical Device Manufacturing Domain Threat Modeling Methodologies: User Perspectives on Security, Privacy and Safety2024 18th International Symposium on Medical Information and Communication Technology (ISMICT)10.1109/ISMICT61996.2024.10738169(22-27)Online publication date: 15-May-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
InfoSec '15: Proceedings of the 2015 Information Security Curriculum Development Conference
October 2015
61 pages
ISBN:9781450340496
DOI:10.1145/2885990
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

  • KSU: Kennesaw State University

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 October 2015

Check for updates

Author Tags

  1. architectural risk analysis
  2. risk management
  3. software security
  4. threat modeling
  5. tool evaluation

Qualifiers

  • Abstract

Conference

INFOSECCD '15
Sponsor:
  • KSU

Acceptance Rates

Overall Acceptance Rate 18 of 23 submissions, 78%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)87
  • Downloads (Last 6 weeks)6
Reflects downloads up to 11 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2025)ZeroVCS: An efficient authentication protocol without trusted authority for zero-trust vehicular communication systemsFuture Generation Computer Systems10.1016/j.future.2024.107520163(107520)Online publication date: Feb-2025
  • (2024)"I'm Getting Information that I Can Act on Now": Exploring the Level of Actionable Information in Tool-generated Threat ReportsProceedings of the 2024 European Symposium on Usable Security10.1145/3688459.3688467(172-186)Online publication date: 30-Sep-2024
  • (2024)Exploring Medical Device Manufacturing Domain Threat Modeling Methodologies: User Perspectives on Security, Privacy and Safety2024 18th International Symposium on Medical Information and Communication Technology (ISMICT)10.1109/ISMICT61996.2024.10738169(22-27)Online publication date: 15-May-2024
  • (2024)Expediting the design and development of secure cloud-based mobile appsInternational Journal of Information Security10.1007/s10207-024-00880-623:4(3043-3064)Online publication date: 1-Aug-2024
  • (2024)Threat Modeling: A Rough Diamond or Fool’s Gold?Software Architecture. ECSA 2023 Tracks, Workshops, and Doctoral Symposium10.1007/978-3-031-66326-0_8(120-129)Online publication date: 30-Jul-2024
  • (2023)Implementing Data Exfiltration Defense in Situ: A Survey of Countermeasures and Human InvolvementACM Computing Surveys10.1145/358207755:14s(1-37)Online publication date: 25-Jan-2023
  • (2022)THREATGET: Towards Automated Attack Tree Analysis for Automotive CybersecurityInformation10.3390/info1401001414:1(14)Online publication date: 27-Dec-2022
  • (2022)Automated Risk Management Based Software Security Vulnerabilities ManagementIEEE Access10.1109/ACCESS.2022.318506910(90597-90608)Online publication date: 2022
  • (2022)Systematic threat assessment and security testing of automotive over-the-air (OTA) updatesVehicular Communications10.1016/j.vehcom.2022.10046835(100468)Online publication date: Jun-2022
  • (2021)Evaluating Threat Modeling Tools: Microsoft TMT versus OWASP Threat Dragon2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)10.1109/CyberSA52016.2021.9478215(1-7)Online publication date: 14-Jun-2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media