Attack Tree, Attack path

  • Bookmarks

Attack Trees, Dr. Dobb's Journal December 1999, Modeling security threats By Bruce Schneier
http://www.schneier.com/paper-attacktrees-ddj-ft.html

Larry Osterman's WebLog, Threat Modeling, Part 2 - threats
http://blogs.msdn.com/larryosterman/archive/2005/01/17/354588.aspx

A Practical Approach to Threat Modeling, Tom Olzak, March 2006
http://adventuresinsecurity.com/blog/wp-content/uploads/2006/03/A_Practical_Approach_to_Threat_Modeling.pdf

Attack Trees, Robert J. Ellison, Software Engineering Institute [vita], Copyright © 2005 Carnegie Mellon University, 2006-03-16
https://buildsecurityin.us-cert.gov/daisy/bsi/articles/best-practices/requirements/236.html

UMLsec
http://www4.in.tum.de/~umlsec/

SecureUML

  • Tools

PTA
http://www.ptatechnologies.com/

UML diagrams