By analyzing the existing tools in detail, several
requirements for a new tool could be derived.
Offering OVVL as a web application, which
combines an extensive threat analysis with an
additional vulnerability analysis and an intuitive
design, we showcased how the lacking areas of the
threat modeling state can be filled. We hope OVVL
will be enhanced further through community
involvement, by making it open source. We think that
this open source approach, coupled with the wide
array of features OVVL will be offering, will make
this tool a meaningful contender in the world of threat
modeling. With the increasing importance of
developing secure software systems, integrating the
approach of “Security by Design” as a core concept
into the development lifecycle will greatly benefit
software projects of any size. By being simple in its
structure, yet powerful in its functionality, OVVL
will support this approach. As such, we are hopeful
that OVVL will improve the current state of threat
modeling.
REFERENCES
Atlassian, Jira Software. [online] Available at:
https://www.atlassian.com/software/jira [Accessed 29
Dec. 2018].
Brown-White, J. et al., 2017. Tactical Threat Modeling.
[online] Available at: https://www.safecode.org/wp-
content/uploads/2017/05/SAFECode_TM_Whitepaper
.pdf [Accessed 11 Dec. 2018].
FIRST.org Inc. Common Vulnerability Scoring System SIG.
[online] Available at: https://www.first.org/cvss/
[Accessed 29 Nov. 2018].
FogBugz. [online] Available at: https://www.fogbugz.com/
[Accessed 29 Dec. 2018].
GDPR, 2018 [online] Available at: https://ec.europa.eu/
commission/priorities/justice-and-fundamental-
rights/data-protection/2018-reform-eu-data-protection-
rules_en [Accessed 18 Mar. 2019].
Goodwin, M. Owasp-threat-dragon-desktop Master
Branch. [online] Available at: https://github.com/mike-
goodwin/owasp-threat-dragon-
desktop/commits/master [Accessed 06 Dec. 2018].
Hoglund, G., McGraw, G., 2004. Exploition Software: How
to break code, Addison Wesley.
Kohnfelder, L., Garg, P., n.d. The threats to our products,
Microsoft Foundation.
Ma, Z., Schmittner, C., 2016. Threat Modeling for
Automotive Security Analysis. In Advanced Science
and Technology Letters Vol. 139, pp. 333–339.
Microsoft Threat Modeling Tool 2016: Getting Started
Guide, n.d. Microsoft Corporation.
MITRE Corporation, n.d. CVE - Common Vulnerabilities
and Exposure. [online] Available at:
https://cve.mitre.org/ [Accessed 28 Nov. 2018].
Myagmar S., Adam J. Lee A., Yurcik W., 2005. Threat
Modeling as a Basis for Security Requirements. In
IEEE Symposium on Requirements Engineering for
Information Security.
National Vulnerability Database, 2018a. [online] Available
at: https://nvd.nist.gov/ [Accessed 29 Nov. 2018].
National Vulnerability Database, 2018b. CPE Summary.
[online] Available at:
https://nvd.nist.gov/products/cpe/detail/334460?keywo
rd=windows+7+64+bit&status=FINAL&orderBy=CP
EURI&namingFormat=2.3 [Accessed 29 Nov. 2018].
National Vulnerability Database, 2018c. CVE-2018-8505
Detail. [online] Available at:
https://nvd.nist.gov/vuln/detail/CVE-2018-8505
[Accessed 14 Nov. 2018].
National Vulnerability Database, 2018d. Official Common
Platform Enumeration (CPE) Dictionary. [online]
Available at: https://nvd.nist.gov/products/cpe
[Accessed 14 Nov. 2018].
OpenProject, 2018 Available at: https://www.
openproject.org/de/ [Accessed: 17.03.2019]
OWASP. OWASP Threat Dragon: Roadmap. [online]
Available at:
https://www.owasp.org/index.php/OWASP_Threat_Dr
agon#Roadmap [Accessed 06 Dec. 2018].
OWASP. Threat Dragon. [online] Available at:
http://docs.threatdragon.org/ [Accessed 06 Dec. 2018].
Pandit, D. Threat Modeling: The Why, How, When and
Which Tools. [online] Available at:
https://devops.com/threat-modeling-the-why-how-
when-and-which-tools/ [Accessed 27 Nov. 2018].
Schaad, A., Borozdin, M., 2012. “TAM2: Automated
Threat Analysis”. In SAC '12 Proceedings of the 27th
Annual ACM Symposium on Applied Computing, pp.
1103–1108.
Secodis GmbH. Threat Modeling [online] Available at:
https://www.secodis.com/bedrohungsanalysen/
[Accessed 27 Nov. 2018].
Shostack, A., 2008. Experiences Threat Modeling at
Microsoft. [online] Available at:
https://adam.shostack.org/modsec08/Shostack-
ModSec08-Experiences-Threat-Modeling-At-
Microsoft.pdf [Accessed 29 Jan. 2019].
Stack Overflow, 2018. Developer Survey Results 2018:
Platforms. [online] Available at:
https://insights.stackoverflow.com/survey/2018/#techn
ology-platforms [Accessed 05 Dec. 2018].
Stavroulakis, P., Stamp, M., 2010. Handbook of
Information and Communication Security, Springer.
Tenable, 2019. Nessus. [online] Available at:
https://www.tenable.com/products/nessus/nessus-
professional [Accessed 17 March, 2019].
SECRYPT 2019 - 16th International Conference on Security and Cryptography
424