Home

About

Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network
FAQHELPSITE MAPCONTACT US


  Advanced Search  

 
Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security
 

Summary: Checking Threat Modeling Data Flow Diagrams
for Implementation Conformance and Security
Marwan Abi-Antoun
Carnegie Mellon University
mabianto@cs.cmu.edu
Daniel Wang
Microsoft Corporation
daniwang@microsoft.com
Peter Torr
Microsoft Corporation
ptorr@microsoft.com
September 2006
CMU-ISRI-06-124
School of Computer Science
Carnegie Mellon University
Pittsburgh, PA 15213

Center for Software Excellence
Abstract
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or

  

Source: Abi-Antoun, Marwan - Department of Computer Science, Wayne State University
Carnegie Mellon University, School of Computer Science

 

Collections: Computer Technologies and Information Sciences