Threat modeling - A systematic literature review

被引:124
作者
Xiong, Wenjun [1 ]
Lagerstrom, Robert [1 ]
机构
[1] KTH Royal Inst Technol, Sch Elect Engn & Comp Sci, Div Network & Syst Engn, Malvinas Vag 6, SE-10044 Stockholm, Sweden
关键词
Threat modeling; Literature review; Cyber security; Risk management; Cyber attacks; INFORMATION SECURITY; ENTERPRISE ARCHITECTURE; DATA-COLLECTION; FRAMEWORK; AWARENESS; PROTOCOL; LIBRARY; DESIGN; CLOUD;
D O I
10.1016/j.cose.2019.03.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber security is attracting worldwide attention. With attacks being more and more common and often successful, no one is spared today. Threat modeling is proposed as a solution for secure application development and system security evaluations. Its aim is to be more proactive and make it more difficult for attackers to accomplish their malicious intents. However, threat modeling is a domain that lacks common ground. What is threat modeling, and what is the state-of-the-art work in this field? To answer these questions, this article presents a review of threat modeling based on systematic queries in four leading scientific databases. This is the first systematic literature review on threat modeling to the best of our knowledge. 176 articles were assessed, and 54 of them were selected for further analysis. We identified three separate clusters: (1) articles making a contribution to threat modeling, e.g., introducing a new method, (2) articles using an existing threat modeling approach, and (3) introductory articles presenting work related to the threat modeling process. The three clusters were analyzed in terms of a set of criteria, for instance: Is the threat modeling approach graphical or formal? Is it focused on a specific attack type and application? Is the contribution validated empirically or theoretically? We observe from the results that, most threat modeling work remains to be done manually, and there is limited assurance of their validations. The results can be used for researchers and practitioners who want to know the state-of-the-art threat modeling methods, and future research directions are discussed. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页码:53 / 69
页数:17
相关论文
共 84 条
  • [1] Al-Fedaghi S., 2011, International Journal of Digital Content Technology and its Applications, V5, P296, DOI [10.4156/jdcta.vol5.issue5.32., DOI 10.4156/JDCTA.VOL5.ISSUE5.32]
  • [2] Al-Fedaghi S., 2014, International Journal of Safety and Security Engineering, V4, P97, DOI [https://doi.org/10.2495/SAFE-V4-N2-97-115, DOI 10.2495/SAFE-V4-N2-97-115]
  • [3] Threat Modeling for Electronic Health Record Systems
    Almulhem, Ahmad
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (05) : 2921 - 2926
  • [4] [Anonymous], 2011, P INT C INF SEC ASS
  • [5] [Anonymous], INDIAN J SCI TECHNOL
  • [6] [Anonymous], 2009, T TIANJIN U, DOI DOI 10.1007/S12209-009-0029-Y
  • [7] An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols
    Armando, Alessandro
    Compagna, Luca
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 125 (01) : 91 - 108
  • [8] Multi-Attacker Protocol Validation
    Arsac, Wihem
    Bella, Giampaolo
    Chantry, Xavier
    Compagna, Luca
    [J]. JOURNAL OF AUTOMATED REASONING, 2011, 46 (3-4) : 353 - 388
  • [9] Baquero Abraham O, 2015, crosstalk, V28, P21
  • [10] Improving the Security of Cryptographic Protocol Standards
    Basin, David
    Cremers, Cas
    Miyazaki, Kunihiko
    Radomirovic, Sasa
    Watanabe, Dai
    [J]. IEEE SECURITY & PRIVACY, 2015, 13 (03) : 24 - 31