Skip to main content

Assuring Compliance with Protection Profiles with ThreatGet

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 11699))

Abstract

We present ThreatGet a new tool for security analysis, based on threat modeling. The tool is integrated into a model-based engineering platform, supporting an iterative and model-based risk management process. We explain the modeling and operation of ThreatGet and how it can be used for security by design. As a specific use case, we demonstrate how ThreatGet can assess compliance with a protection profile.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   74.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Checkoway, S. et al.: Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium (2011)

    Google Scholar 

  2. Swiderski, Frank, Snyder, Window: Threat Modeling (Microsoft Professional), vol. 7. Microsoft Press, Sebastopol (2014)

    Google Scholar 

  3. parxSystems. http://sparxsystems.com/products/ea/. Accessed 30 Oct 2018

  4. Shaaban, A.M., Schmittner, C.: Security chain tool for IoT secure applications. Austrian Institute of Technology – Digital Safety and Security (2019)

    Google Scholar 

  5. Bundesamtfür Sicherheit in der Informationstechnik. Digital tachograph - vehicle unit (VU PP). https://www.bsi.bund.de. Accessed 01 May 2019

  6. Shaaban, A.M., Schmittner, C., Latzenhofer, M., Hofer, M.: Contribution title. A proposal for a comprehensive automotive cybersecurity reference architecture. In: The Seventh International Conference on Advances in Vehicular Systems, Technologies and Applications (2018)

    Google Scholar 

  7. ISO: ISO 31000 - Risk management - guidelines (2018)

    Google Scholar 

  8. ISO/IEC: Information technology – Security techniques – Information security risk management (2018)

    Google Scholar 

  9. IEC 31010: Risk management – Risk assessment techniques. Pub. L. No. IEC 31010 (2009)

    Google Scholar 

  10. Ramos, A.L., Ferreira, J.V., Barcelo, J.: Model-based systems engineering: an emerging approach for modern systems. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 42(1), 101–111 (2012). https://doi.org/10.1109/TSMCC.2011.2106495. Accessed 01 May 2019

    Article  Google Scholar 

  11. Microsoft Threat Modeling Tool 2016. https://www.microsoft.com/en-us/download/details.aspx?id=49168. Accessed 01 May 2019

  12. Threat Modeling at the speed of DevOps. https://continuumsecurity.net/. Accessed 01 May 2019

  13. threatmodeler. https://threatmodeler.com/. Accessed 01 May 2019

  14. A Pythonic framework for threat modeling. https://github.com/izar/pytm. Accessed 01 May 2019

  15. Automated Threat Modeling and Attack Simulations. https://www.foreseeti.com/. Accessed 01 May 2019

  16. Security Compass - SDElements. https://www.securitycompass.com/sdelements/. Accessed 01 May 2019

  17. Tutamantic. http://www.tutamantic.com/. Accessed 01 May 2019

  18. OWASP Threat Dragon. https://www.owasp.org. Accessed 01 May 2019

  19. Threat modelling tool from Mozilla. https://github.com/mozilla/seasponge. Accessed 01 May 2019

Download references

Acknowledgments

The work published here has received funding from the AQUAS project, under grant agreement No. 737475. The project is co-funded by grants from Austria, the Czech republic, Germany, Italy, France, Spain, The UK, and ECSEL JU.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Christoph Schmittner .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

El Sadany, M., Schmittner, C., Kastner, W. (2019). Assuring Compliance with Protection Profiles with ThreatGet. In: Romanovsky, A., Troubitsyna, E., Gashi, I., Schoitsch, E., Bitsch, F. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2019. Lecture Notes in Computer Science(), vol 11699. Springer, Cham. https://doi.org/10.1007/978-3-030-26250-1_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-26250-1_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-26249-5

  • Online ISBN: 978-3-030-26250-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics