Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Peter John Torr is active.

Publication


Featured researches published by Peter John Torr.


ieee symposium on security and privacy | 2005

Demystifying the threat modeling process

Peter John Torr

In todays hostile online environment, software must be designed to withstand malicious attacks of all kinds. Unfortunately, even security-conscious products can fall prey when designers fail to understand the threats their software faces or the ways in which adversaries might try to attack it. To better understand a products threat environment and defend against potential attacks, Microsoft uses threat modeling, which should be treated like any other part of the design and specification process. In fact, singling it out as a special activity performed outside the normal design process actually detracts from its importance to the overall development life cycle. We must consider security needs throughout the design process, just as we do with performance, usability, localizability, serviceability, or any other facet.


automated software engineering | 2007

Checking threat modeling data flow diagrams for implementation conformance and security

Marwan Abi-Antoun; Daniel Wang; Peter John Torr

Threat modeling is a lightweight approach to reason about application security and uses Data Flow Diagrams (DFDs) with security annotations. We extended Reflexion Models to check the conformance of an as-designed DFD with an approximation of the as-built DFD obtained from the implementation. We also designed a set of properties and an analysis to help novice designers think about security threats such as spoofing, tampering and information disclosure.


Archive | 2012

Background Transfer Service for Applications on Mobile Devices

Marc McClure; Abolade Gbadegesin; Chittur Subbaraman; Jianping Yin; Jorge I. Raastroem; Yasser Shaaban; Timothy D. Noonan; Rachel Jiang; Peter John Torr; Vishal V. Ghotge; Gregory Arthur de Souza; Pavan Rajamohan Hullumane; Adrian Dragomir; Darin Miller; Megan Donahue


Archive | 2011

Background Audio on Mobile Devices

Lejie Xu; Peter John Torr; Mei L. Wilson; Rachel Jiang; Bryan Welbourne Nealer; Eric Bie; Christopher James Pearson; William G. Patton; Yensheng Wang


Archive | 2006

Advanced content authentication and authorization

Andrew J. Clinick; Peter John Torr; Sean Hayes


Archive | 2011

Constrained Execution of Background Application Code on Mobile Devices

Peter John Torr; Abolade Gbadegesin; Shawn P. Burke; Vijayendra Gopalrao Vasu; Jason William Fuller; Randal J. Ramig; Kunal R. Gandhi; Jorge I. Raastroem; Darin Miller; Alper Selcuk; Timothy Michael Kurtzman; Rachel Jiang


Archive | 2011

Abstraction layer for online/offline resource access

Peter John Torr


Archive | 2006

Controlling application features

Paul Stubbs; Eric S. Schnepp; Peter John Torr; John A. Shepard


Archive | 2008

ARRANGEMENT FOR CONNECTIVITY WITHIN AN ADVANCED MULTIMEDIA CONTENT FRAMEWORK

James C. Finger; Peter John Torr; Praful Pratap Chavda; Richard E. Doherty


Archive | 2008

ARRANGEMENT FOR ANONYMOUS API DOWNLOADED RESOURCES FOR ADVANCED CONTENT

James C. Finger; Peter John Torr; Andrew J. Clinick; Jeffrey A. Davis

Collaboration


Dive into the Peter John Torr's collaboration.

Researchain Logo
Decentralizing Knowledge