Two architectural threat analysis techniques compared

Katja Tuma*, Riccardo Scandariato

*Corresponding author for this work

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review


In an initial attempt to systematize the research field of architectural threat analysis, this paper presents a comparative study of two threat analysis techniques. In particular, the controlled experiment presented here compares two variants of Microsoft’s STRIDE. The two variants differ in the way the analysis is performed. In one case, each component of the software system is considered in isolation and scrutinized for potential security threats. In the other case, the analysis has a wider scope and considers the security threats that might occur in a pair of interacting software components. The study compares the techniques with respect to their effectiveness in finding security threats (benefits) as well as the time that it takes to perform the analysis (cost). We also look into other human aspects which are important for industrial adoption, like, for instance, the perceived difficulty in learning and applying the techniques as well as the overall preference of our experimental participants.

Original languageEnglish
Title of host publicationSoftware Architecture - 12th European Conference on Software Architecture, ECSA 2018, Proceedings
EditorsJennifer Pérez, Carlos E. Cuesta, David Garlan
PublisherSpringer Verlag,
Number of pages17
ISBN (Print)9783030007607
Publication statusPublished - 2018
Externally publishedYes
Event12th European Conference on Software Architecture, ECSA 2018 - Madrid, Spain
Duration: 24 Sept 201828 Sept 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11048 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference12th European Conference on Software Architecture, ECSA 2018

Bibliographical note

Publisher Copyright:
© Springer Nature Switzerland AG 2018.

Copyright 2019 Elsevier B.V., All rights reserved.


  • Empirical study
  • Secure software
  • Threat analysis


Dive into the research topics of 'Two architectural threat analysis techniques compared'. Together they form a unique fingerprint.

Cite this