참고문헌
- SAFECode, Fundamental Practices for Secure Software Development, 2nd Ed., Software Assurance Forum for Excellence in Code, 2011.
- F.Swiderski, W.Snyder, Threat Modeling, Microsoft Press, 2004.
- M.Howard, S.Lipner, The Security Development Lifecycle. Microsoft Press, 2006.
- M.Howard, J.A.Whittacker, "Demistifying the Threat-Modeling Process", IEEE Security & Privacy, 2005.
- A.Shostack, Threat Modeling: Designing for Security, John Wiley & Sons, 2014.
- OWASP https://www.owasp.org/index.php/Threat_Risk_Modeling
- Octave http://www.cert.org/resilience/products-services/octave/index.cfm
- National Infrastructure Advisory Council, Common Vulnerability Scoring System, US.Dept.Homeland Security, 2004.
- Trike http://www.octotrike.org/
- AS/NZS ISO 31000:2009 http://shop.standards.co.nz/catalog/31000%3A2009%28AS%7CNZS+ISO%29/view
- PASTA http://www.myappsecurity.org
- Klockwork, Threat Modeling for Secure Embedded Software, Security Innovation & Klockwork White Paper, 2011.
- M.Deng, K.Wuyts, et.al, "A Privacy Threat Analysis Framework: Supporting the Elicitation and Fulfillment of Privacy Requirements", Journal of Requirements Engineering, Springer-Verlag 2011.
- CWE(Common Weakness Enumeration) http://cwe.mitre.org/
- CVE(Common Vulnerabilities Exposures) https://cve.mitre.org/
- Y.Cherdantseva, J.Hilton, "A Reference Model of Information Assurance & Security", Int. Conf. on Availability, Reliability, & Security, IEEE 2013.