Design of Secure Applications
24 setembro 2015, 11:00 • Miguel Filipe Leitão Pardal
Threat modeling:
- Application decomposition using data-flow diagrams.
- Threat identification with the STRIDE model.
- Threat representation with threat trees.
- Threat assessment with the DREAD model.
Penetration testing and input mutation.