TerrARA: Automated Security Threat Modeling for Infrastructure as Code. Tran, A., Sion, L., Yskout, K., & Joosen, W. In Joshi, J., Vaidya, J., & Schulmann, H., editors, Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2025, Pittsburgh, PA, USA, June 4-6, 2025, pages 269–280, 2025. ACM.
Paper doi bibtex @inproceedings{DBLP:conf/codaspy/TranSYJ25,
author = {Anh{-}Duy Tran and
Laurens Sion and
Koen Yskout and
Wouter Joosen},
editor = {James Joshi and
Jaideep Vaidya and
Haya Schulmann},
title = {TerrARA: Automated Security Threat Modeling for Infrastructure as
Code},
booktitle = {Proceedings of the Fifteenth {ACM} Conference on Data and Application
Security and Privacy, {CODASPY} 2025, Pittsburgh, PA, USA, June 4-6,
2025},
pages = {269--280},
publisher = {{ACM}},
year = {2025},
url = {https://doi.org/10.1145/3714393.3726494},
doi = {10.1145/3714393.3726494},
timestamp = {Wed, 11 Jun 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/codaspy/TranSYJ25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"dCEpKWvfYd2vkYfM4","bibbaseid":"tran-sion-yskout-joosen-terraraautomatedsecuritythreatmodelingforinfrastructureascode-2025","author_short":["Tran, A.","Sion, L.","Yskout, K.","Joosen, W."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Anh-Duy"],"propositions":[],"lastnames":["Tran"],"suffixes":[]},{"firstnames":["Laurens"],"propositions":[],"lastnames":["Sion"],"suffixes":[]},{"firstnames":["Koen"],"propositions":[],"lastnames":["Yskout"],"suffixes":[]},{"firstnames":["Wouter"],"propositions":[],"lastnames":["Joosen"],"suffixes":[]}],"editor":[{"firstnames":["James"],"propositions":[],"lastnames":["Joshi"],"suffixes":[]},{"firstnames":["Jaideep"],"propositions":[],"lastnames":["Vaidya"],"suffixes":[]},{"firstnames":["Haya"],"propositions":[],"lastnames":["Schulmann"],"suffixes":[]}],"title":"TerrARA: Automated Security Threat Modeling for Infrastructure as Code","booktitle":"Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2025, Pittsburgh, PA, USA, June 4-6, 2025","pages":"269–280","publisher":"ACM","year":"2025","url":"https://doi.org/10.1145/3714393.3726494","doi":"10.1145/3714393.3726494","timestamp":"Wed, 11 Jun 2025 01:00:00 +0200","biburl":"https://dblp.org/rec/conf/codaspy/TranSYJ25.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/codaspy/TranSYJ25,\n author = {Anh{-}Duy Tran and\n Laurens Sion and\n Koen Yskout and\n Wouter Joosen},\n editor = {James Joshi and\n Jaideep Vaidya and\n Haya Schulmann},\n title = {TerrARA: Automated Security Threat Modeling for Infrastructure as\n Code},\n booktitle = {Proceedings of the Fifteenth {ACM} Conference on Data and Application\n Security and Privacy, {CODASPY} 2025, Pittsburgh, PA, USA, June 4-6,\n 2025},\n pages = {269--280},\n publisher = {{ACM}},\n year = {2025},\n url = {https://doi.org/10.1145/3714393.3726494},\n doi = {10.1145/3714393.3726494},\n timestamp = {Wed, 11 Jun 2025 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/codaspy/TranSYJ25.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Tran, A.","Sion, L.","Yskout, K.","Joosen, W."],"editor_short":["Joshi, J.","Vaidya, J.","Schulmann, H."],"key":"DBLP:conf/codaspy/TranSYJ25","id":"DBLP:conf/codaspy/TranSYJ25","bibbaseid":"tran-sion-yskout-joosen-terraraautomatedsecuritythreatmodelingforinfrastructureascode-2025","role":"author","urls":{"Paper":"https://doi.org/10.1145/3714393.3726494"},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/306/0533.bib","dataSources":["z26Mjy7DeE253owyu"],"keywords":[],"search_terms":["terrara","automated","security","threat","modeling","infrastructure","code","tran","sion","yskout","joosen"],"title":"TerrARA: Automated Security Threat Modeling for Infrastructure as Code","year":2025}