Research Article
Automating Risk Analysis of Software Design Models
Listing 2
CSRF risk sorting threats.
(4) [CSRF] Path: {[Anon. User]-[App. server]-[VO Admin]} Risk: [0.7128] | (5) [CSRF] Path: {[Anon. User]-[App. server]-[Ident. User]} Risk: [0.6534] | (7) [CSRF] Path: {[Ident. User]-[App. server]-[VO Admin]} Risk: [0.6534] | (8) [CSRF] Path: {[Ident. User]-[App. server]-[Ident. User]} Risk: [0.5989] | (6) [CSRF] Path: {[Anon. User]-[App. server]-[Anon. User]} Risk: [0.3564] | (1) [CSRF] Path: {[VO Admin]-[App. server]-[VO Admin]} Risk: [0.3564] | (9) [CSRF] Path: {[Ident. User]-[App. server]-[Anon. User]} Risk: [0.3267] | (2) [CSRF] Path: {[VO Admin]-[App. server]-[Ident. User]} Risk: [0.3267] | (3) [CSRF] Path: {[VO Admin]-[App. server]-[Anon. User]} Risk: [0.1782] |
|