Show simple item record

dc.contributor.authorCruzes, Daniela Soares
dc.contributor.authorJaatun, Martin Gilje
dc.contributor.authorBernsmed, Karin
dc.contributor.authorTøndel, Inger Anne
dc.date.accessioned2019-06-27T08:24:21Z
dc.date.available2019-06-27T08:24:21Z
dc.date.created2019-06-26T12:08:14Z
dc.date.issued2018
dc.identifier.issn2377-5408
dc.identifier.urihttp://hdl.handle.net/11250/2602474
dc.description.abstractThe goal of secure software engineering is to create software that keeps performing as intended even when exposed to attacks. Threat modeling is considered to be a key activity, but can be challenging to perform for developers, and even more so in agile software development. Hence, threat modeling has not seen widespread use in agile software projects. The goal of this paper is to investigate the challenges facing adoption of threat modeling using the Microsoft approach with STRIDE. We performed a case study in a company comprising five agile development projects. We identified 21 challenges to threat modeling that emerged from our observations. We then mapped these challenges to challenges found in the literature. Some challenges overlap the findings from the literature; the extra challenges we have found in our exploratory study came mostly from the activities of asset identification and also from our observations on what happened after the threat modeling meetings. This study shows that we still have to address many challenges in order to get a proper adoption of threat modeling in agile development projects.nb_NO
dc.language.isoengnb_NO
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)nb_NO
dc.titleChallenges and Experiences with Applying Microsoft Threat Modeling in Agile Development Projectsnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.journal2018 25th Australasian Software Engineering Conference (ASWEC)nb_NO
dc.identifier.doi10.1109/ASWEC.2018.00023
dc.identifier.cristin1707967
dc.description.localcode© 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.nb_NO
cristin.unitcode194,63,30,0
cristin.unitcode194,63,10,0
cristin.unitnameInstitutt for informasjonssikkerhet og kommunikasjonsteknologi
cristin.unitnameInstitutt for datateknologi og informatikk
cristin.ispublishedtrue
cristin.fulltextpostprint


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record