Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 15222))

Included in the following conference series:

  • 159 Accesses

Abstract

Security by construction is an approach to system development where security considerations are integrated into the design process from the very beginning. Threat modeling helps identify potential threats and vulnerabilities early in the system development process, assess the risk associated with each threat, and design appropriate mitigation actions. In this paper, we study threat model repair, a method to automatically suggest structural changes to the design that mitigate threats discovered by the analysis. This helps find a secure design early in the process by allowing a user to quickly iterate over different design variants.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Bjørner, N.S., Phan, A.D.: \(\nu \)z - maximal satisfaction with Z3. In: Temur Kutsia and Andrei Voronkov, editors, 6th International Symposium on Symbolic Computation in Software Science, SCSS 2014, Gammarth, La Marsa, Tunisia, December 7-8, 2014, vol. 30 of EPiC Series in Computing, pp 1–9. EasyChair (2014)

    Google Scholar 

  2. Christl, K., Tarrach, T.: The analysis approach of threatget. CoRR, abs/2107.09986 (2021)

    Google Scholar 

  3. McRee, R.: Microsoft threat modeling tool 2014: identify and mitigate. Inf. Syst. Secur. Assoc. J. 39–42 (2014)

    Google Scholar 

  4. El Sadany, M., Schmittner, C., Kastner, W.: Assuring compliance with protection profiles with threatget. In: Alexander B. Romanovsky, Elena Troubitsyna, Ilir Gashi, Erwin Schoitsch, and Friedemann Bitsch, editors, Computer Safety, Reliability, and Security - SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, Turku, Finland, September 10, 2019, Proceedings, volume 11699 of Lecture Notes in Computer Science, pp. 62–73. Springer (2019). https://doi.org/10.1007/978-3-030-26250-1_5

  5. Tarrach, T., Ebrahimi, M., König, S., Schmittner, C., Bloem, R., Nickovic, D.: Attribute repair for threat prevention. In: Jérémie Guiochet, Stefano Tonetta, and Friedemann Bitsch, editors, Computer Safety, Reliability, and Security - 42nd International Conference, SAFECOMP 2023, Toulouse, France, September 20-22, 2023, Proceedings, vol. 14181 of Lecture Notes in Computer Science, pp. 135–148. Springer (2023). https://doi.org/10.1007/978-3-031-40923-3_11

Download references

Acknowledgements

This work received funding from the AIMS5.0 project regarding AI based transformation of the European Industry. The AIMS5.0 project is supported by the Chips Joint Undertaking and its members, including the top-up funding by National Funding Authorities from involved countries under grant agreement no. 101112089.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dejan Ničković .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bloem, R., Chlup, S., Ničković, D., Schmittner, C. (2025). On Threat Model Repair. In: Margaria, T., Steffen, B. (eds) Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering Methodologies. ISoLA 2024. Lecture Notes in Computer Science, vol 15222. Springer, Cham. https://doi.org/10.1007/978-3-031-75387-9_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-75387-9_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-75386-2

  • Online ISBN: 978-3-031-75387-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics