Aug. 4, 2023, 1:10 a.m. | Felix Schwickerath, Nicolas Boltz, Sebastian Hahner, Maximilian Walter, Christopher Gerking, Robert Heinrich

cs.CR updates on arXiv.org arxiv.org

Through the increasing interconnection between various systems, the need for
confidential systems is increasing. Confidential systems share data only with
authorized entities. However, estimating the confidentiality of a system is
complex, and adjusting an already deployed software is costly. Thus, it is
helpful to have confidentiality analyses, which can estimate the
confidentiality already at design time. Based on an existing data-flow-based
confidentiality analysis concept, we reimplemented a data flow analysis as a
Java-based tool. The tool uses the software architecture …

analysis architecture confidential confidentiality data entities flow interconnection share software system systems tool

Cybersecurity Engineer III

@ Hexagon US Federal | Huntsville, AL

Cybersecurity Technical Advisor

@ Microsoft | Reading, Berkshire, United Kingdom

Cybersecurity Engineer

@ Mindvalley | Kuala Lumpur, Kuala Lumpur, Malaysia

Network Security (Meraki) Infrastructure Lead

@ Sopra Steria | Noida, Uttar Pradesh, India

Sr. Director, Product Security

@ Ro | New York City or Remote

Senior Research Engineer, Cryptography (PhD Entry Level)

@ Seagate Technology | Shakopee, MN, US