You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Excited about living threat models and their applications to help us keep our applications secure and understand if our code is doing what we think it's doing!
If we can get get people to open source their threat models, we'll be able to understand how secure dependent projects are based on their usage (context)
Demo the creation of an LTM
Docs on how to extend
Call to action of defining the language
Community, flexible enough
As long as you speak schema XYZ then you can build visualization
How to deal with false positives (overlays for triage)
We understand this will not be easy, we know what it means to scan code, or third party stuff with CVEs, that might be an overlay, if it doesn't apply to you don't apply
John Andersen (15 minutes)
Demo
1 or two threats in the threat matrix
Overlays
Open Architecture Working Group
Mention
Take threat model from good/bad
Operation and dataflow as possible schema, make ADRs for each
Show how we represent good/bad using the open architecture
Augment with scan data
Enumerate binaries found
Show how we represent these using the open architecture
Map classification wise to components within the threat model
Produce warnings and THREATS.md
Take manually generated threat model (good.json/bad.json) and produce open architecture
CVE Bin Tool does scan, outputs open architecture
Alice takes both architectures and outputs whatever format we want via whatever overlays we apply
THREATS.md by combining the two
She optionally runs any auditors via overlays
Overlays can be arbitrarily nested
Take manually generated threat model (good.json/bad.json) and produce open architecture
Alice takes both architectures and outputs whatever format we want via whatever overlays we apply
THREATS.md by combining the two
She optionally runs any auditors via overlays
Overlays can be arbitrarily layered
Future work
CVE Bin Tool does scan, outputs open architecture
The text was updated successfully, but these errors were encountered:
THREATS.md
auditor.py good.json
auditor.py bad.json
THREATS.md
THREATS.md
good.json
/bad.json
) and produce open architectureTHREATS.md
by combining the twogood.json
/bad.json
) and produce open architectureTHREATS.md
by combining the twoThe text was updated successfully, but these errors were encountered: