Skip to content

Commit e6694e4

Browse files
Merge pull request #117 from Majid-Mollaeefar/patch-3
add new paper
2 parents 578d365 + 7dc1fa4 commit e6694e4

File tree

3 files changed

+41
-0
lines changed

3 files changed

+41
-0
lines changed

_data/destinations.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,12 @@
1212
url: https://www.sciencedirect.com/journal/computers-and-security
1313
type: journal
1414

15+
- id: FGCS
16+
name: Future Generation Computer Systems
17+
acronym: FGCS
18+
url: https://www.sciencedirect.com/journal/future-generation-computer-systems
19+
type: journal
20+
1521
- id: FMSD
1622
name: Formal Methods in System Design
1723
url: https://www.springer.com/journal/10703

_data/people.yml

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,10 @@
44
name: Aaron
55
surname: Stump
66

7+
- id: AbdulazizKalash
8+
name: Abdulaziz
9+
surname: Kalash
10+
711
- id: AchimBrucker
812
name: Achim D.
913
surname: Brucker
@@ -293,6 +297,10 @@
293297
name: Davide
294298
surname: Pizzolotto
295299

300+
- id: DavyPreuveneers
301+
name: Davy
302+
surname: Preuveneers
303+
296304
- id: DimitriVanLanduyt
297305
name: Dimitri
298306
surname: Van Landuyt
@@ -440,6 +448,10 @@
440448
441449
phone: "+390461312378"
442450

451+
- id: GiampaoloBella
452+
name: Giampaolo
453+
surname: Bella
454+
443455
- id: GianfrancoBurzio
444456
name: Gianfranco
445457
surname: Burzio
@@ -1095,6 +1107,10 @@
10951107
name: Stanislav
10961108
surname: Dashevskyi
10971109

1110+
- id: StefVerreydt
1111+
name: Stef
1112+
surname: Verreydt
1113+
10981114
- id: StefanoBerlato
10991115
name: Stefano
11001116
surname: Berlato

_data/publications.yml

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2283,6 +2283,25 @@
22832283
year: 2025
22842284
doi:
22852285

2286+
- id: FGCS2025
2287+
id_iris: 364408
2288+
title: "A comparative benchmark study of LLM-based threat elicitation tools"
2289+
authors:
2290+
- DimitriVanLanduyt
2291+
- MajidMollaeefar
2292+
- MarioRaciti
2293+
- StefVerreydt
2294+
- AbdulazizKalash
2295+
- AndreaBissoli
2296+
- DavyPreuveneers
2297+
- GiampaoloBella
2298+
- SilvioRanise
2299+
abstract: >
2300+
Threat modeling refers to the software design activity that involves the proactive identification, evaluation, and mitigation of specific potential threat scenarios. Recently, attention has been growing for the potential to automate the threat elicitation process using Large Language Models (llms), and different tools have emerged that are capable of generating threats based on system models and other descriptive system documentation. This paper presents the outcomes of an experimental evaluation study of llm-based threat elicitation tools, which we apply to two complex and contemporary application cases that involve biometric authentication. The comparative benchmark is based on a grounded approach to establish four distinct baselines which are representative of the results of human threat modelers, both novices and experts. In support of scale and reproducibility, the evaluation approach itself is maximally automated using sentence transformer models to perform threat mapping. Our study evaluates 56 distinct threat models generated by 6 llm-based threat elicitation tools. While the generated threats are somewhat similar to the threats documented by human threats modelers, relative performance is low. The evaluated llm-based threat elicitation tools prove to be particularly inefficient in eliciting the threats on the expert level. Furthermore, we show that performance differences between these tools can be attributed on a similar level to both the prompting approach (e.g., multi-shot, knowledge pre-prompting, role prompting) and the actual reasoning capabilities of the underlying llms being used.
2301+
destination: FGCS
2302+
year: 2025
2303+
doi: 10.1016/j.future.2025.108243
2304+
22862305
- id: IWBF2025
22872306
id_iris: 362127
22882307
title: "Spotting Tell-Tale Visual Artifacts in Face Swapping Videos: Strengths and Pitfalls of CNN Detectors"

0 commit comments

Comments
 (0)