Attack chains as TM technique

Track: Threat Model
When: Tue PM-2
Organizers Steven Wierckx
Participants Adam Shostack

WHY

We need different techniques to discover threats against a system to complement the traditional ones if they do not work.

What

Create attack chains as TM technique. Extedend possibly using DFD as connection maps, layered defence and attack patterns.

Outcomes

An example of an attack chain.

References

Register as participant

To register as participant add Attack chains as TM technique to either:

  1. the sessions metadata field from your participant's page (find your participant page and look for the edit link).
  2. or the participants metadata field from this git session page


Back to list of all Working Sessions