Danny Dhillon - IEEE Xplore Author Profile

Showing 1-2 of 2 results

Results

This paper presents the results of software security verification as practiced by a large infrastructure software vendor. Threat modeling is performed by developers to formulate testable security requirements that are verified with automated scanners, developer-led verification of the threat model as well as centralized independent verification.Show More
This article describes EMC/s real-world experiences with threat modeling, including major challenges encountered, lessons learned, and a description of the company's current developer-driven approach. Threat modeling is a conceptual exercise in which we analyze a system's architecture or design to find security flaws and reduce architectural risk.Show More