“Open Weakness and Vulnerability Modeler” (OVVL): An Updated Approach to Threat Modeling

Andreas Schaad, Tobias Reski

Abstract

The development of secure software systems is of ever-increasing importance. While software companies often invest large amounts of resources into the upkeeping and general security properties of large-scale applications when in production, they appear to neglect utilizing threat modeling in the earlier stages of the software development lifecycle. When applied during the design phase of development, and continuously throughout development iterations, threat modeling can help to establish a “Secure by Design” approach. This approach allows issues relating to IT security to be found early during development, reducing the need for later improvement – and thus saving resources in the long term. In this paper the current state of threat modeling is investigated. This investigation drove the derivation of requirements for the development of a new threat modelling framework and tool, called OVVL. OVVL utilizes concepts of established threat modeling methodologies, as well as functionality not available in existing solutions.

Download


Paper Citation


in Harvard Style

Schaad A. and Reski T. (2019). “Open Weakness and Vulnerability Modeler” (OVVL): An Updated Approach to Threat Modeling.In Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT, ISBN 978-989-758-378-0, pages 417-424. DOI: 10.5220/0007919004170424


in Bibtex Style

@conference{secrypt19,
author={Andreas Schaad and Tobias Reski},
title={“Open Weakness and Vulnerability Modeler” (OVVL): An Updated Approach to Threat Modeling},
booktitle={Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT,},
year={2019},
pages={417-424},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0007919004170424},
isbn={978-989-758-378-0},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT,
TI - “Open Weakness and Vulnerability Modeler” (OVVL): An Updated Approach to Threat Modeling
SN - 978-989-758-378-0
AU - Schaad A.
AU - Reski T.
PY - 2019
SP - 417
EP - 424
DO - 10.5220/0007919004170424