<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://c4d.lias-lab.fr/index.php?action=history&amp;feed=atom&amp;title=WP6-02</id>
	<title>WP6-02 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://c4d.lias-lab.fr/index.php?action=history&amp;feed=atom&amp;title=WP6-02"/>
	<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP6-02&amp;action=history"/>
	<updated>2026-04-07T01:16:16Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.37.1</generator>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP6-02&amp;diff=1165&amp;oldid=prev</id>
		<title>Ait at 12:31, 27 November 2023</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP6-02&amp;diff=1165&amp;oldid=prev"/>
		<updated>2023-11-27T12:31:05Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 12:31, 27 November 2023&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l46&quot;&gt;Line 46:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 46:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Interoperability with other C4D tools ==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Interoperability with other C4D tools ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;While the AIT Security Analysis utilizes an enhanced Dataflow Diagram / Architecture Model for the threat analysis, there is a possibility to connect this model with traces to an SysML Model and interact with other SysML based Tools. In addition to that risk identified and requirements defined can be exchanged with requirement management tools, e.g. Excel, XML, RIF/ReqIF. An asset driven Cybersecurity Workflow [https://c4d.lias-lab.fr/index.php/WP6-&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;03 &lt;/del&gt;AIT Workflow] was developed for extended analysis options for the system models.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;While the AIT Security Analysis utilizes an enhanced Dataflow Diagram / Architecture Model for the threat analysis, there is a possibility to connect this model with traces to an SysML Model and interact with other SysML based Tools. In addition to that risk identified and requirements defined can be exchanged with requirement management tools, e.g. Excel, XML, RIF/ReqIF. An asset driven Cybersecurity Workflow [https://c4d.lias-lab.fr/index.php/WP6-&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;01 &lt;/ins&gt;AIT Workflow] was developed for extended analysis options for the system models.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[File:AIT_TG_toolchain.png|600px|thumb|frame|center| AIT Security Analysis Tool Toolchain]]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[File:AIT_TG_toolchain.png|600px|thumb|frame|center| AIT Security Analysis Tool Toolchain]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key mediawiki-mediawiki-:diff::1.12:old-661:rev-1165 --&gt;
&lt;/table&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
	<entry>
		<id>https://c4d.lias-lab.fr/index.php?title=WP6-02&amp;diff=661&amp;oldid=prev</id>
		<title>Ait: Created page with &quot;= ThreatGet – Post- / Precondition = {|class=&quot;wikitable&quot; |  ID|| WP6-02 |- |   Contributor	|| AIT |- |   Levels	|| Tool |- |   Require	|| Windows, Enterprise Architect, SysML model |- |   Provide	|| Threat Analysis and Risk Management. |- |   Input	||  SysML model |- |   Output	|| Threat Analysis and Risk Assesment, Report |- |   C4D tooling		|| n.a. |- |   TRL		|| 4 (for application to Drone Systems) |- |   License || Commercial, Non-Commercial, Academic |- |   URL...&quot;</title>
		<link rel="alternate" type="text/html" href="https://c4d.lias-lab.fr/index.php?title=WP6-02&amp;diff=661&amp;oldid=prev"/>
		<updated>2022-10-14T07:28:24Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;= ThreatGet – Post- / Precondition = {|class=&amp;quot;wikitable&amp;quot; |  ID|| WP6-02 |- |   Contributor	|| AIT |- |   Levels	|| Tool |- |   Require	|| Windows, Enterprise Architect, SysML model |- |   Provide	|| Threat Analysis and Risk Management. |- |   Input	||  SysML model |- |   Output	|| Threat Analysis and Risk Assesment, Report |- |   C4D tooling		|| n.a. |- |   TRL		|| 4 (for application to Drone Systems) |- |   License || Commercial, Non-Commercial, Academic |- |   URL...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;= ThreatGet – Post- / Precondition =&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|  ID|| WP6-02&lt;br /&gt;
|-&lt;br /&gt;
|   Contributor	|| AIT&lt;br /&gt;
|-&lt;br /&gt;
|   Levels	|| Tool&lt;br /&gt;
|-&lt;br /&gt;
|   Require	|| Windows, Enterprise Architect, SysML model&lt;br /&gt;
|-&lt;br /&gt;
|   Provide	|| Threat Analysis and Risk Management.&lt;br /&gt;
|-&lt;br /&gt;
|   Input	||  SysML model&lt;br /&gt;
|-&lt;br /&gt;
|   Output	|| Threat Analysis and Risk Assesment, Report&lt;br /&gt;
|-&lt;br /&gt;
|   C4D tooling		|| n.a.&lt;br /&gt;
|-&lt;br /&gt;
|   TRL		|| 4 (for application to Drone Systems)&lt;br /&gt;
|-&lt;br /&gt;
|   License || Commercial, Non-Commercial, Academic&lt;br /&gt;
|-&lt;br /&gt;
|   URL     || https://www.threatget.com/&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
ThreatGet offers an automated security (threat) analysis and supports risk managements. This is based on a model of the system and a database of relevant threats, weaknesses and vulnerabilities. The system model is analyzed, potential threats are identified and guidance for threat treatment is provided. For certification the tool offers a report function.&lt;br /&gt;
&lt;br /&gt;
== Detailed Description ==&lt;br /&gt;
The AIT Security Analysis Tool can be used as analysis tool to identify security issues in a design and verification toolchain and also to provide input for security testing and analysis. An overview of interactions is shown in  in the following figure.&lt;br /&gt;
&lt;br /&gt;
[[File:AIT_TG_Placement_and_Interaction_Toolchain.png|600px|thumb|frame|center| Placement and Interaction of AIT Security Analysis tool in toolchain]]&lt;br /&gt;
&lt;br /&gt;
The model in the tool can be based either on a informal description of a system (e.g. developed from scratch) or based on an already existing system model (e.g. formal description). In the case of a formal description there is the potential to ensure traceability between the existing model and the model for the security analysis. Outcome of the analysis are:&lt;br /&gt;
&lt;br /&gt;
# A list of potential risks and attacks, where likelihood and impact can be rated to enable risk assessment.&lt;br /&gt;
# Based on the risks, security measures can be assigned and used as input for further design and development. Either the security measures can be directly defined in the model, or a requirement document can be defined.&lt;br /&gt;
# Identified risks and attacks can also be used as input for security testing and verification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Contribution and Improvements==&lt;br /&gt;
In context of Comp4Drones ThreatGet focuses on an analysis of potential drone usage scenarios and architectures to identify potential security risks and evaluate mitigation measures. For this AIT developed a drone-specific Toolbox. The Toolbox consists of a set of Drone and UAV-domain specific elements, which are divided into generic elements and more specific sub-elements as shown in the following figure.&lt;br /&gt;
&lt;br /&gt;
[[File:AIT_UAV_Toolbox.png|600px|thumb|frame|center| UAV Toolbox]]&lt;br /&gt;
&lt;br /&gt;
== Interoperability with other C4D tools ==&lt;br /&gt;
&lt;br /&gt;
While the AIT Security Analysis utilizes an enhanced Dataflow Diagram / Architecture Model for the threat analysis, there is a possibility to connect this model with traces to an SysML Model and interact with other SysML based Tools. In addition to that risk identified and requirements defined can be exchanged with requirement management tools, e.g. Excel, XML, RIF/ReqIF. An asset driven Cybersecurity Workflow [https://c4d.lias-lab.fr/index.php/WP6-03 AIT Workflow] was developed for extended analysis options for the system models.&lt;br /&gt;
&lt;br /&gt;
[[File:AIT_TG_toolchain.png|600px|thumb|frame|center| AIT Security Analysis Tool Toolchain]]&lt;/div&gt;</summary>
		<author><name>Ait</name></author>
	</entry>
</feed>