tufts-tsp / tmnt

Tufts Security & Privacy Lab's Threat Modeling Naturally Tool
https://tsp.eecs.tufts.edu/tmnt
Other
0 stars 0 forks source link

Fill in info on various threat modeling tools #72

Open ZenW00kie opened 5 months ago

ZenW00kie commented 5 months ago

Found in project/ThreatModelingTools.md for each tool we need the following:

For both advantages and limitations, it would be good to reference which of our design goals (see project/OVERVIEW.md# Design Goals) are being used/not used. Additionally, for the tools that are labeled as DSLs or UIs, we want to evaluate how expressive they are using a few examples that we have. The first is from a medical device standard ISO 11073 (see attached) Annex E), one of the four examples listed in Adam Shostack's book (again it's in Appendix E, and you can use your Tufts account to access the book here), and then the threat model described in this work from researchers at Queen's.

List of Tools

Diagramming Only

ZenW00kie commented 5 months ago

@dvotipka probably want to update the evaluation method to be more specific, rather than just the four points I have. Not sure if you have a template, but I know we've looked at this from CMU in the past.

ZenW00kie commented 5 months ago

And if you can't access Adam's book let me know!

ZenW00kie commented 5 months ago

@lisadang04 @esamnesru @giakwon pick three tools each to work through (pick one from each category)