Track: | Threat Model |
---|---|
When: | Tue PM-2 |
Where: | Kings |
Organizers | Steven Wierckx Steven Wierckx |
Participants | Adam Shostack Adam Shostack , Aurelijus Stanislovaitis Aurelijus Stanislovaitis , Claudio Camerino Claudio Camerino , Fabien Thalgott Fabien Thalgott , Luis Saiz Luis Saiz , Paul Davies Paul Davies , Ruben Tronçon Ruben Tronçon , Sotiraki Sima Sotiraki Sima , Stuart Winter-Tear Stuart Winter-Tear , Tash Norris Tash Norris |
Remote Participants | Abhi Raj Abhi Raj , Andrew Martin Andrew Martin , Vinod Anandan Vinod Anandan |
WHY
We need different techniques to discover threats against a system to complement the traditional ones if they do not work.
What
Create attack chains as TM technique. Extedend possibly using DFD as connection maps, layered defence and attack patterns.
Outcomes
An example of an attack chain.
References
Register as participant
To register as participant add Attack chains as TM technique
to either:
- the
sessions
metadata field from your participant's page (find your participant page and look for the edit link). - or the
participants
metadata field from this git session page
Back to list of all Working Sessions