Abi-Antoun, M. et al. (2007). Checking threat modeling
data flow diagrams for implementation conformance
and security. In ASE’07, pages 393–396.
Alabiso, B. (1988). Transformation of Data Flow Analysis
Models to Object Oriented Design. In OOPSLA’88,
pages 335–354.
Almorsy, M. et al. (2013). Automated software architecture
security risk analysis using formalized signatures. In
ICSE’13, pages 662–671.
Basili, V. R. et al. (1994). The Goal Question Metric Ap-
proach. In Encyclopedia of Software Engineering - 2
Volume Set, pages 528–532.
Berger, B. J. et al. (2016). Automatically Extracting Threats
from Extended Data Flow Diagrams. In ESSoS’16,
volume 9639, pages 56–71.
Boehm, B. and Basili, V. R. (2001). Software Defect Re-
duction Top 10 List. Computer, 34(1):135–137.
DeMarco, T. (1979). Structured analysis and system speci-
fication. Prentice-Hall, Englewood Cliffs, N.J.
Furnell, S., editor (2008). Securing information and com-
munications systems: principles, technologies, and
applications. Artech House, Boston.
Hahner, S. et al. (2021). Modeling data flow constraints for
design-time confidentiality analyses. In ICSA 2021.
accepted, to appear.
Hedin, D. et al. (2012). A Perspective on Information-Flow
Control. In Software Safety and Security - Tools for
Analysis and Verification, volume 33 of NATO Science
for Peace and Security Series - D, pages 319–347.
Heyman, T. et al. (2012). Reusable Formal Models for Se-
cure Software Architectures. In WICSA’12, pages 41–
50.
Hoisl, B. et al. (2014). Modeling and enforcing secure
object flows in process-driven SOAs: an integrated
model-driven approach. SoSym, 13(2):513–548.
Hoo, K. S. et al. (2001). Tangible ROI through Secure Soft-
ware Engineering. Secure Business Quart., 1(2):1–3.
International Organization for Standardization (2018).
ISO/IEC 27000:2018(E). Standard, ISO.
Jilani, A. et al. (2011). Comparative Study on DFD to UML
Diagrams Transformations. WCSIT, 1(1):10–16.
J
¨
urjens, J. (2005). Secure Systems Development with UML.
Springer-Verlag, Berlin Heidelberg.
Katkalov, K. (2017). Ein modellgetriebener Ansatz zur
Entwicklung informationsflusssicherer Systeme. PhD
Thesis, University of Augsburg, Augsburg. German.
Katkalov, K. et al. (2013). Model-Driven Development of
Information Flow-Secure Systems with IFlow. In So-
cialCom’2013, pages 51–56.
Khedker, U. et al. (2009). Data Flow Analysis: Theory and
Practice. CRC Press, Inc., USA, 1st edition.
King, D. et al. (2008). Implicit Flows: Can’t Live with ‘Em,
Can’t Live without ‘Em. In ICISS, pages 56–70.
Lowry, E. S. and Medlock, C. W. (1969). Object code opti-
mization. Communications of the ACM, 12(1):13–22.
McGraw, G. (2006). Software Security - Building Security
In. Addison-Wesley Professional.
Metz, C. E. (1978). Basic principles of ROC analysis. Sem-
inars in Nuclear Medicine, 8(4):283–298.
Microsoft Corporation et al. (2009). Mi-
crosoft SDL: Return-on-Investment.
https://www.nccgroup.trust/globalassets/our-
research/us/whitepapers/isec-partners—microsoft-
sdl-return-on-investment.pdf. accessed 20/11/25.
Nguyen, P. H. et al. (2015). An extensive systematic review
on the Model-Driven Development of secure systems.
IST, 68:62–81.
OMG (2020). Unified Architecture Framework. Standard
formal/19-11-07, Object Management Group.
Reussner, R. H. et al. (2016). Modeling and Simulating
Software Architectures - The Palladio Approach. MIT
Press, Cambridge, MA.
Runeson, P. et al. (2012). Case Study Research in Software
Engineering: Guidelines and Examples. Wiley.
Sandhu, R. S. et al. (1994). Access control: principle and
practice. IEEE ComMag, 32(9):40–48.
Seifermann, S. et al. (2019). Data-Driven Software Ar-
chitecture for Analyzing Confidentiality. In ICSA’19,
pages 1–10.
Seifermann, S. et al. (2021). SECRYPT 2021 Evaluation
Data Set. https://doi.org/10.5281/zenodo.4699417.
Shostack, A. (2014). Threat modeling: designing for secu-
rity. Wiley, Indianapolis, IN.
Shull, F. et al. (2002). What we have learned about fighting
defects. In METRICS’02, pages 249–258.
Sion, L. et al. (2018). Solution-aware data flow diagrams
for security threat modeling. In SAC’18, pages 1425–
1432.
Sion, L. et al. (2020). Security Threat Modeling: Are Data
Flow Diagrams Enough? In ICSEW’20.
Smith, G. (2007). Principles of Secure Information Flow
Analysis. In Malware Detection, ADIS, pages 291–
307.
Torres, W. et al. (2020). A systematic literature review of
cross-domain model consistency checking by model
management tools. SoSym.
Tuma, K. et al. (2019). Flaws in Flows: Unveiling Design
Flaws via Information Flow Analysis. In ICSA’19,
pages 191–200.
Tuma, K. et al. (2020). Automating the early detection of
security design flaws. In MoDELS’20, pages 332–342.
van den Berghe, A. et al. (2017). A Model for Provably
Secure Software Design. In FormaliSE’17, pages 3–
9.
van den Berghe, A. et al. (2017). Design notations for se-
cure software: a systematic literature review. SoSym,
16(3):809–831.
Venson, E. et al. (2019). Costing Secure Software Devel-
opment: A Systematic Mapping Study. In ARES’19,
pages 1–11.
Wang, L. et al. (2009). TMAC: Taint-Based Memory Pro-
tection via Access Control. In DEPEND’09, pages
19–27.
Werle, D. et al. (2020). Data Stream Operations as
First-Class Entities in Component-Based Performance
Models. In ECSA’20, pages 148–164.
Xu, W. et al. (2006). Taint-Enhanced Policy Enforcement:
A Practical Approach to Defeat a Wide Range of At-
tacks. In USENIX Security Symposium.
Zdancewic, S. (2004). Challenges for Information-flow Se-
curity. In PLID’04, page 5.
A Unified Model to Detect Information Flow and Access Control Violations in Software Architectures
37