Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 6 additions & 0 deletions _data/destinations.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,12 @@
url: https://www.sciencedirect.com/journal/computers-and-security
type: journal

- id: FGCS
name: Future Generation Computer Systems
acronym: FGCS
url: https://www.sciencedirect.com/journal/future-generation-computer-systems
type: journal

- id: FMSD
name: Formal Methods in System Design
url: https://www.springer.com/journal/10703
Expand Down
16 changes: 16 additions & 0 deletions _data/people.yml
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,10 @@
name: Aaron
surname: Stump

- id: AbdulazizKalash
name: Abdulaziz
surname: Kalash

- id: AchimBrucker
name: Achim D.
surname: Brucker
Expand Down Expand Up @@ -293,6 +297,10 @@
name: Davide
surname: Pizzolotto

- id: DavyPreuveneers
name: Davy
surname: Preuveneers

- id: DimitriVanLanduyt
name: Dimitri
surname: Van Landuyt
Expand Down Expand Up @@ -440,6 +448,10 @@
email: [email protected]
phone: "+390461312378"

- id: GiampaoloBella
name: Giampaolo
surname: Bella

- id: GianfrancoBurzio
name: Gianfranco
surname: Burzio
Expand Down Expand Up @@ -1095,6 +1107,10 @@
name: Stanislav
surname: Dashevskyi

- id: StefVerreydt
name: Stef
surname: Verreydt

- id: StefanoBerlato
name: Stefano
surname: Berlato
Expand Down
19 changes: 19 additions & 0 deletions _data/publications.yml
Original file line number Diff line number Diff line change
Expand Up @@ -2283,6 +2283,25 @@
year: 2025
doi:

- id: FGCS2025
id_iris: 364408
title: "A comparative benchmark study of LLM-based threat elicitation tools"
authors:
- DimitriVanLanduyt
- MajidMollaeefar
- MarioRaciti
- StefVerreydt
- AbdulazizKalash
- AndreaBissoli
- DavyPreuveneers
- GiampaoloBella
- SilvioRanise
abstract: >
Threat modeling refers to the software design activity that involves the proactive identification, evaluation, and mitigation of specific potential threat scenarios. Recently, attention has been growing for the potential to automate the threat elicitation process using Large Language Models (llms), and different tools have emerged that are capable of generating threats based on system models and other descriptive system documentation. This paper presents the outcomes of an experimental evaluation study of llm-based threat elicitation tools, which we apply to two complex and contemporary application cases that involve biometric authentication. The comparative benchmark is based on a grounded approach to establish four distinct baselines which are representative of the results of human threat modelers, both novices and experts. In support of scale and reproducibility, the evaluation approach itself is maximally automated using sentence transformer models to perform threat mapping. Our study evaluates 56 distinct threat models generated by 6 llm-based threat elicitation tools. While the generated threats are somewhat similar to the threats documented by human threats modelers, relative performance is low. The evaluated llm-based threat elicitation tools prove to be particularly inefficient in eliciting the threats on the expert level. Furthermore, we show that performance differences between these tools can be attributed on a similar level to both the prompting approach (e.g., multi-shot, knowledge pre-prompting, role prompting) and the actual reasoning capabilities of the underlying llms being used.
destination: FGCS
year: 2025
doi: 10.1016/j.future.2025.108243

- id: IWBF2025
id_iris: 362127
title: "Spotting Tell-Tale Visual Artifacts in Face Swapping Videos: Strengths and Pitfalls of CNN Detectors"
Expand Down