[prev in list] [next in list] [prev in thread] [next in thread] 

List:       websecurity
Subject:    [WEB SECURITY] Trike threat modeling methodology v1 paper release
From:       "Paul B. Saitta" <pbs () dymaxion ! org>
Date:       2005-07-21 19:58:05
Message-ID: 20050721195035.GB30052 () dymaxion ! org
[Download RAW message or body]


Hi,

I'm happy to announce the release of a new paper detailing the current state
of a new conceptual framework and methodology for threat modeling, Trike.
Although Trike is a work in progress, this (draft) release is intended to
share the work we're doing with the larger community.

The paper is available at http://dymaxion.org/trike/ or
http://www.hhhh.org/trike/papers.

To subscribe to the announcements list for future work, send mail
with "subscribe trike-announce" in the body to majordomo@hhhh.org

Paul Saitta

----

Abstract:

Trike is a unified conceptual framework for security auditing from a risk
management perspective through the generation of threat models in a reliable,
repeatable manner.  A security auditing team can use it to completely and
accurately describe the security characteristics of a system from its high-
level architecture to its low-level implementation details.  Trike also
enables communication among security team members and between security teams
and other stakeholders by providing a consistent conceptual framework.  This
document describes the current version of the methodology (currently under
heavy de- velopment) in sufficient detail to allow its use.  In addition to
detail on the threat model itself (including automatic threat generation and
attack graphs), we cover the two models used in its generation, namely the
requirements model and the implementation model, along with notes on risk
analysis and work flows.  The final version of this paper will include a fully
worked example for the entire process.  Trike is distinguished from other
threat modeling methodologies by the high levels of automation possible within
the system, the defensive perspective of the system, and the degree of
formalism present in the methodology.  Portions of this methodology are
currently experimental; as they have not been fully tested against real
systems, care should be exercised when using them.

The methodology described in this document is copyright 2003-2005 Paul Saitta,
Brenda Larcom, and Michael Eddington, excluding those covered under other
copyrights, and the whole may be used under the MIT license
(http://www.opensource.org/licenses/mit-license.  php), "Software" being
replaced with "methodology" throughout.  This document is published under the
Creative Commons attribution-noncommercial-sharealike 2.0 license (http://
creativecommons.org/licenses/by-nc-sa/2.0/legalcode).

-- 
Ideas are my favorite toys.

[Attachment #3 (application/pgp-signature)]

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic