Difference between revisions of "2012 Summer Project Week:Threat Modeling"
From NAMIC Wiki
(Created page with '__NOTOC__ <gallery> Image:PW-MIT2012.png|Projects List Image:genuFAp.jpg|Scatter plot of the original FA data through the genu of the corpus…') |
|||
Line 2: | Line 2: | ||
<gallery> | <gallery> | ||
Image:PW-MIT2012.png|[[2012_Summer_Project_Week#Projects|Projects List]] | Image:PW-MIT2012.png|[[2012_Summer_Project_Week#Projects|Projects List]] | ||
− | Image: | + | Image:Threat.jpg|Unsecured code can be a launching pad to take control of the host computer. |
</gallery> | </gallery> | ||
Revision as of 15:30, 6 June 2012
Home < 2012 Summer Project Week:Threat Modeling
Key Investigators
- Kitware: Julien Finet (JC)
- Radnostics: Anthony Blumfield
Objective
Identify “low hanging fruit” architecture enhancements that will limit the ability of using 3D slicer as a launching pad to take control of the host computer.
Why now? Earlier architectural changes are cheaper and reduce the application compatibility burden.
Approach, Plan
During project week we will create a high level threat model for 3D Slicer v4 and identify possible mitigations
Progress
Delivery Mechanism
- Document
References
- Swiderski F, Snyder W. Threat Modeling. ISBN-0735619913
- Howard M, LeBlanc D. Writing Secure Code, Second Edition. ISBN-0735617228