Follow
Katja Tuma
Title
Cited by
Cited by
Year
Threat Analysis of Software Systems: A Systematic Literature Review
K Tuma, G Calikli, R Scandariato
Journal of Systems and Software, 2018
1372018
Flaws in flows: Unveiling design flaws via information flow analysis
K Tuma, R Scandariato, M Balliu
2019 IEEE International Conference on Software Architecture (ICSA), 191-200, 2019
462019
Automating the early detection of security design flaws
K Tuma, L Sion, R Scandariato, K Yskout
Proceedings of the 23rd ACM/IEEE International Conference on Model Driven …, 2020
422020
Towards security threats that matter
K Tuma, R Scandariato, M Widman, C Sandberg
Computer Security: ESORICS 2017 International Workshops, CyberICPS 2017 and …, 2018
412018
Two architectural threat analysis techniques compared
K Tuma, R Scandariato
Software Architecture: 12th European Conference on Software Architecture …, 2018
332018
Secure data-flow compliance checks between models and code based on automated mappings
S Peldszus, K Tuma, D Strüber, J Jürjens, R Scandariato
2019 ACM/IEEE 22nd International Conference on Model Driven Engineering …, 2019
232019
Towards automated security design flaw detection
L Sion, K Tuma, R Scandariato, K Yskout, W Joosen
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
192019
Finding security threats that matter: Two industrial case studies
K Tuma, C Sandberg, U Thorsson, M Widman, T Herpel, R Scandariato
Journal of Systems and Software 179, 111003, 2021
182021
Inspection guidelines to identify security design flaws
K Tuma, D Hosseini, K Malamas, R Scandariato
Proceedings of the 13th European Conference on Software Architecture-Volume …, 2019
122019
Checking security compliance between models and code
K Tuma, S Peldszus, D Strüber, R Scandariato, J Jürjens
Software and systems modeling 22 (1), 273-296, 2023
92023
Towards a Security Stress-Test for Cloud Configurations
F Minna, F Massacci, K Tuma
2022 IEEE 15th International Conference on Cloud Computing (CLOUD), 191-196, 2022
72022
Precise analysis of purpose limitation in Data Flow Diagrams
H Alshareef, K Tuma, S Stucki, G Schneider, R Scandariato
Proceedings of the 17th International Conference on Availability …, 2022
62022
Seven pain points of threat analysis and risk assessment in the automotive domain
K Tuma, M Widman
IEEE Security & Privacy 19 (5), 78-82, 2021
62021
Efficiency and automation in threat analysis of software systems
K Tuma
PQDT-Global, 2021
52021
Back to the Drawing Board
S Jasser, K Tuma, R Scandariato, M Riebisch
Proceedings of the 4th International Conference on Information Systems …, 2018
52018
The role of diversity in cybersecurity risk analysis: An experimental plan
K Tuma, R Van Der Lee
Proceedings of the Third Workshop on Gender Equality, Diversity, and …, 2022
42022
Analyzing and Mitigating (with LLMs) the Security Misconfigurations of Helm Charts from Artifact Hub
F Minna, F Massacci, K Tuma
arXiv preprint arXiv:2403.09537, 2024
22024
A replication of a controlled experiment with two STRIDE variants
W Mbaka, K Tuma
arXiv preprint arXiv:2208.01524, 2022
22022
Finding Security Threats That Matter: An Industrial Case Study
K Tuma, C Sandberg, U Thorsson, M Widman, R Scandariato
arXiv preprint arXiv:1910.03422, 2019
22019
On the Measures of Success in Replication of Controlled Experiments with STRIDE
W Mbaka, K Tuma
International Journal of Software Engineering and Knowledge Engineering 34 …, 2024
12024
The system can't perform the operation now. Try again later.
Articles 1–20