Design of Secure Applications

24 Setembro 2015, 11:00 Miguel Filipe Leitão Pardal

Threat modeling:

  • Application decomposition using data-flow diagrams.
  • Threat identification with the STRIDE model.
  • Threat representation with threat trees.
  • Threat assessment with the DREAD model.

Penetration testing and input mutation.