REFERENCES
Adams, S. C., Carter, B. T., Fleming, C. H., and Beling,
P. A. (2018). Selecting system specific cybersecurity
attack patterns using topic modeling. In 17th IEEE
International Conference On Trust, Security And Pri-
vacy In Computing And Communications / 12th IEEE
International Conference On Big Data Science And
Engineering, TrustCom/BigDataSE 2018, New York,
NY, USA, August 1-3, 2018, pages 490–497.
Almorsy, M., Grundy, J., and Ibrahim, A. S. (2013). Auto-
mated software architecture security risk analysis us-
ing formalized signatures. In 35th International Con-
ference on Software Engineering, ICSE ’13, San Fran-
cisco, CA, USA, May 18-26, 2013, pages 662–671.
Berger, B. J., Sohr, K., and Koschke, R. (2016). Automat-
ically extracting threats from extended data flow dia-
grams. In Engineering Secure Software and Systems
- 8th International Symposium, ESSoS 2016, London,
UK, April 6-8, 2016. Proceedings, pages 56–71.
Blakley, B., Heath, C., and of The Open Group Security Fo-
rum, M. (2004). Security design patterns. Technical
guide, TheOpen Group.
BSI (2016). Industrial Control System Security - Top 10
Threats and Countermeasures 2016. Bsi-cs 005e —
version 1.20 of 08/01/2016, Federal Office for Infor-
mation Security (BSI).
Dahl, H., Hogganvik, I., and Stlen, K. (2007). Struc-
tured semantics for the coras security risk modelling
language. In Proc. of 2nd International Workshop
on Interoperability solutions on Trust, Security, Poli-
cies and QoS for Enhanced Enterprise Systems (IS-
TSPQ’07).
Deng, M., Wuyts, K., Scandariato, R., Preneel, B., and
Joosen, W. (2011). A privacy threat analysis frame-
work: supporting the elicitation and fulfillment of pri-
vacy requirements. Requir. Eng., 16(1):3–32.
Halkidis, S. T., Tsantalis, N., Chatzigeorgiou, A., and
Stephanides, G. (2008). Architectural risk analysis
of software systems based on security patterns. IEEE
Trans. Dependable Sec. Comput., 5(3):129–142.
IEC 62443 (2013-2018). Industrial communication net-
works - Network and system security - Security for in-
dustrial automation and control systems. International
standard, International Electrotechnical Commission
(IEC).
Khan, R., McLaughlin, K., Laverty, D., and Sezer, S.
(2017). Stride-based threat modeling for cyber-
physical systems. In 2017 IEEE PES Innovative
Smart Grid Technologies Conference Europe (ISGT-
Europe), pages 1–6. IEEE.
Kohnfelder, L. and Grag, P. (2009). The threats to
our products. Technical report, Microsoft Coopo-
ration. https://adam.shostack.org/microsoft/The-
Threats-To-Our-Products.docx.
Li, T., Paja, E., Mylopoulos, J., Horkoff, J., and Beck-
ers, K. (2016). Security attack analysis using attack
patterns. In 2016 IEEE Tenth International Confer-
ence on Research Challenges in Information Science
(RCIS), pages 1–13.
Maidl, M., Wirtz, R., Zhao, T., Heisel, M., and Wagner, M.
(2019). Pattern-based modeling of cyber-physical sys-
tems for analyzing security. In Proceedings of the 24th
European Conference on Pattern Languages of Pro-
grams, EuroPLop ’19, pages 23:1–23:10, New York,
NY, USA. ACM.
MITRE (2019). Common Attack Pattern Enumeration and
Classification (CAPEC). https://capec.mitre.org.
Shevchenko, N., Frye, B. R., and Woody, C. (2018). Threat
modeling for cyber-physical system-of-systems:
Methods evaluation. Technical report, Carnegie
Mellon University Software Engineering Institute.
Shostack, A. (2014). Threat modeling - Designing for secu-
rity. Wiley Publishing, 1st edition.
Tuma, K., Calikli, G., and Scandariatoa, R. (2018). Threat
analysis of software systems: A systematic literature
review. The Journal of Systems & Software, 144:275–
294.
Uzunov, A. V. and Fern
´
andez, E. B. (2014). An extensible
pattern-based library and taxonomy of security threats
for distributed systems. Computer Standards & Inter-
faces, 36(4):734–747.
Xiong, W. and Lagerstr
¨
om, R. (2019). Threat modeling -
A systematic literature review. Computers & Security,
84:53–69.
Threat Modeling for Cyber-Physical Systems: A Two-dimensional Taxonomy Approach for Structuring Attack Actions
171