Katja Tuma
Cited by
Cited by
Threat Analysis of Software Systems: A Systematic Literature Review
K Tuma, G Calikli, R Scandariato
Journal of Systems and Software, 2018
Towards security threats that matter
K Tuma, R Scandariato, M Widman, C Sandberg
Computer Security, 47-62, 2017
Flaws in flows: Unveiling design flaws via information flow analysis
K Tuma, R Scandariato, M Balliu
2019 IEEE International Conference on Software Architecture (ICSA), 191-200, 2019
Automating the early detection of security design flaws
K Tuma, L Sion, R Scandariato, K Yskout
Proceedings of the 23rd ACM/IEEE International Conference on Model Driven …, 2020
Two architectural threat analysis techniques compared
K Tuma, R Scandariato
European Conference on Software Architecture, 347-363, 2018
Secure data-flow compliance checks between models and code based on automated mappings
S Peldszus, K Tuma, D Strüber, J Jürjens, R Scandariato
2019 ACM/IEEE 22nd International Conference on Model Driven Engineering …, 2019
Towards automated security design flaw detection
L Sion, K Tuma, R Scandariato, K Yskout, W Joosen
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
Inspection guidelines to identify security design flaws
K Tuma, D Hosseini, K Malamas, R Scandariato
Proceedings of the 13th European Conference on Software Architecture-Volume …, 2019
Finding security threats that matter: Two industrial case studies
K Tuma, C Sandberg, U Thorsson, M Widman, T Herpel, R Scandariato
Journal of Systems and Software 179, 111003, 2021
Back to the Drawing Board
S Jasser, K Tuma, R Scandariato, M Riebisch
Proceedings of the 4th International Conference on Information Systems …, 2018
Efficiency and automation in threat analysis of software systems
K Tuma
PQDT-Global, 2021
Finding Security Threats That Matter: An Industrial Case Study
K Tuma, C Sandberg, U Thorsson, M Widman, R Scandariato
arXiv preprint arXiv:1910.03422, 2019
Precise Analysis of Purpose Limitation in Data Flow Diagrams
H Alshareef, K Tuma, S Stucki, G Schneider, R Scandariato
Proceedings of the 17th International Conference on Availability …, 2022
The Role of Diversity in Cybersecurity Risk Analysis: An Experimental Plan
K Tuma, R Van Der Lee
arXiv preprint arXiv:2208.01895, 2022
A replication of a controlled experiment with two STRIDE variants
W Mbaka, K Tuma
arXiv preprint arXiv:2208.01524, 2022
Towards a Security Stress-Test for Cloud Configurations
F Minna, F Massacci, K Tuma
arXiv preprint arXiv:2205.14498, 2022
Checking security compliance between models and code
K Tuma, S Peldszus, D Strüber, R Scandariato, J Jürjens
Software and Systems Modeling, 1-24, 2022
Human Aspect of Threat Analysis: A Replication
K Tuma, W Mbaka
Seven Pain Points of Threat Analysis and Risk Assessment in the Automotive Domain
K Tuma, M Widman
IEEE Security & Privacy 19 (5), 78-82, 2021
Secure Data-Flow Compliance Checks between Models and Code based on Automated Mappings (Summary)
S Peldszus, K Tuma, D Strüber, J Jürjens, R Scandariato
Software Engineering 2020, 2020
The system can't perform the operation now. Try again later.
Articles 1–20