What do you assume? A Theory of Security-Related Assumptions
Abstract
References
Index Terms
- What do you assume? A Theory of Security-Related Assumptions
Recommendations
A descriptive study of assumptions in STRIDE security threat modeling
AbstractSecurity threat modeling involves the systematic elicitation of plausible threat scenarios, and leads to the identification and articulation of the security requirements in the early stages of software development. Although they are an important ...
Unhelpful Assumptions in Software Security Research
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityIn the study of software security many factors must be considered. Once venturing beyond the simplest of laboratory experiments, the researcher is obliged to contend with exponentially complex conditions. Software security has been shown to be affected ...
Rejoinder---Robust Prediction and Unrealistic Assumptions
In the response to my commentary on his 2007 editorial entitled “It's the Findings, Stupid, Not the Assumptions,” Steven Shugan raises a number of thought-provoking ideas. In this rejoinder, I focus on three issues that Shugan and I hold the most ...
Comments
Information & Contributors
Information
Published In
- Co-chairs:
- Ana Paiva,
- Rui Abreu,
- Program Co-chairs:
- Abhik Roychoudhury,
- Margaret Storey
Sponsors
In-Cooperation
- Faculty of Engineering of University of Porto
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Short-paper
Conference
Acceptance Rates
Upcoming Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 75Total Downloads
- Downloads (Last 12 months)75
- Downloads (Last 6 weeks)20
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in