TUHH Open Research
Help
  • Log In
    New user? Click here to register.Have you forgotten your password?
  • English
  • Deutsch
  • Communities & Collections
  • Publications
  • Research Data
  • People
  • Institutions
  • Projects
  • Statistics
  1. Home
  2. TUHH
  3. Publications
  4. Automatic security-flaw detection - towards a fair evaluation and comparison
 
Options

Automatic security-flaw detection - towards a fair evaluation and comparison

Citation Link: https://doi.org/10.15480/882.15788
Publikationstyp
Journal Article
Date Issued
2025-07-21
Sprache
English
Author(s)
Berger, Bernhard Johannes  orcid-logo
Studiendekanat Elektrotechnik, Informatik und Mathematik (E)  
Plump, Christina  
TORE-DOI
10.15480/882.15788
TORE-URI
https://hdl.handle.net/11420/57043
Journal
Software and systems modeling  
Volume
24
Start Page
1763
End Page
1796
Citation
Software and Systems Modeling 24: 1763–1796 (2025)
Publisher DOI
10.1007/s10270-025-01300-6
Scopus ID
2-s2.0-105011359196
Publisher
Springer
Threat Modeling is an essential step in secure software system development. It is a (so far) manual, attacker-centric approach for identifying architecture-level security flaws during the planning phase of software systems. In recent years, academia has presented ideas to automate threat detection that do not focus on a particular class of security flaws but offer means of pattern-based security flaw descriptions. However, comparing presented ideas (tools) for automated threat detection contains the potential for unwilling bias or restricted information content. In this work, we investigate the process of comparing automatic security flaw detection tools, clarify common pitfalls during this process, and propose a fair, reproducible, and informative comparison approach to be used as a community standard. We additionally discuss the necessary steps for the community to effectively implement this approach and support improved comparisons and evaluations in the future. We use a previously published case study to determine problems with current comparison techniques and classify different levels of comparison to be used for future reference as our main contribution. As a consequence, we propose using a model-based approach for specifying security flaws and apply an existing natural language-based catalogue to this model-based approach. Furthermore, we introduce an inspection process model (for providing a standard to specify findings of a threat detection process) to streamline the evaluation and comparisons of automatic security flaw detection tools. We provide an exemplary evaluation of this detection guideline and inspection process model along the lines of both automatic approaches from the original case study. All artefacts of the work are publicly available to support the research community and to create a common baseline for future tool comparisons.
Subjects
Automation
Comparison
Dataflow diagrams
Interoperability
Security flaw detection
Threat modeling
DDC Class
004: Computer Sciences
006: Special computer methods
Funding(s)
Projekt DEAL  
Lizenz
https://creativecommons.org/licenses/by/4.0/
Publication version
publishedVersion
Loading...
Thumbnail Image
Name

s10270-025-01300-6.pdf

Type

Main Article

Size

2.3 MB

Format

Adobe PDF

TUHH
Weiterführende Links
  • Contact
  • Send Feedback
  • Cookie settings
  • Privacy policy
  • Impress
DSpace Software

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science
Design by effective webwork GmbH

  • Deutsche NationalbibliothekDeutsche Nationalbibliothek
  • ORCiD Member OrganizationORCiD Member Organization
  • DataCiteDataCite
  • Re3DataRe3Data
  • OpenDOAROpenDOAR
  • OpenAireOpenAire
  • BASE Bielefeld Academic Search EngineBASE Bielefeld Academic Search Engine
Feedback