A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Knowledge is Power: Systematic Reuse of Privacy Knowledge for Threat Elicitation
2019
2019 IEEE Security and Privacy Workshops (SPW)
Privacy threat modeling is difficult. Identifying relevant threats that cause privacy harm requires an extensive assessment of common potential privacy issues for all elements in the system-under-analysis. In practice, the outcome of a threat modeling exercise thus strongly depends on the level of experience and expertise of the analyst. However, capturing (at least part of) this privacy expertise in a reusable threat knowledge base (i.e. an inventory of common threat types), such as LINDDUN's
doi:10.1109/spw.2019.00025
dblp:conf/sp/WuytsSLJ19
fatcat:l73jsvup5zhq3lsgzwbzzigav4