Case Studies
AegisShield’s effectiveness was empirically validated using 15 diverse case studies extracted from academic literature. These case studies span multiple domains, application types, and security contexts to ensure comprehensive evaluation.Overview
The case studies were systematically selected to represent:- Diverse application types: IoT, AI/ML, web, mobile, ICS/SCADA
- Multiple industries: Healthcare, finance, telecommunications, energy, manufacturing
- Varying complexity levels: From simple systems to complex architectures
- Different security contexts: Internet-facing, air-gapped, cloud-based
case_studies/ directory of the AegisShield repository. Each is documented in Markdown format with detailed metadata.Research Purpose
These case studies served as the foundation for validating AegisShield through:- Qualitative Comparative Analysis (QCA): Systematic examination of threat models across diverse scenarios
- Baseline Comparison: Generated threat models compared against expert-developed models from academic sources
- Quality Assessment: Evaluation using structured rubrics to measure threat modeling effectiveness
- Reproducibility: Providing transparent, documented test cases for independent validation
Case Study Summary
Case Study 1: Voice-Based Applications
Case Study 1: Voice-Based Applications
Type: IoT Application
Complexity: ModerateDescription: Voice-based application with IoT integration for voice command processing. Includes client-side application, server-side processing, cloud services, and IoT controller for device management.Key Components:
- Voice capture (microphone) and output (speaker)
- Client/server architecture
- Cloud service integration
- IoT device control
Internet Facing: YesReference: Yuldasheva, N. (2024). A THREAT MODEL FOR VOICE-BASED APPLICATIONS. The American Journal of Engineering and Technology, 6(05).
Case Study 2: Visual Sensor Networks
Case Study 2: Visual Sensor Networks
Type: IoT Application
Complexity: HighDescription: Distributed visual sensor network for surveillance and monitoring with edge processing capabilities.Key Components:
- Distributed sensor nodes
- Edge computing infrastructure
- Central monitoring system
- Real-time video processing
Internet Facing: Yes
Case Study 3: 5G Core Slicing
Case Study 3: 5G Core Slicing
Type: Network Infrastructure
Complexity: Very HighDescription: 5G network core slicing architecture enabling dynamic resource allocation and network virtualization.Key Components:
- Network slice management
- Virtual network functions
- Orchestration layer
- Multi-tenancy support
Internet Facing: Yes
Case Study 4: Smart Manufacturing Systems
Case Study 4: Smart Manufacturing Systems
Type: ICS/SCADA
Complexity: HighDescription: Industrial IoT system for smart manufacturing with real-time monitoring, predictive maintenance, and automated control.Key Components:
- Industrial sensors and actuators
- SCADA systems
- MES (Manufacturing Execution System)
- Supply chain integration
Internet Facing: Partial
Case Study 5: Oil Refinery Distributed Control System
Case Study 5: Oil Refinery Distributed Control System
Type: ICS/SCADA
Complexity: Very HighDescription: Critical infrastructure DCS for oil refinery operations with safety-critical process control.Key Components:
- Distributed control nodes
- Safety instrumented systems (SIS)
- Human-machine interface (HMI)
- Emergency shutdown systems
Internet Facing: No (Air-gapped)
Case Study 6: Social Media Network Security
Case Study 6: Social Media Network Security
Case Study 7: Ambient Intelligence System
Case Study 7: Ambient Intelligence System
Type: IoT Application
Complexity: HighDescription: Context-aware ambient intelligence system for adaptive environments and health monitoring.Key Components:
- Environmental sensors
- Context reasoning engine
- Adaptive control systems
- Health monitoring devices
Internet Facing: Yes
Case Study 8: Automotive Infotainment HPC
Case Study 8: Automotive Infotainment HPC
Type: Embedded System
Complexity: HighDescription: High-performance computing system for vehicle infotainment with connectivity and user interface.Key Components:
- In-vehicle infotainment (IVI)
- Connectivity modules (V2X)
- User interface and controls
- Integration with vehicle systems
Internet Facing: Yes
Case Study 9: AI/ML Predictive System
Case Study 9: AI/ML Predictive System
Type: AI/ML Application
Complexity: Very HighDescription: AI/ML-based predictive maintenance architecture for solar energy grid optimization.Key Components:
- Sensor data collection and logging
- Data preprocessing and anonymization
- ML model training and deployment (TOREADOR platform)
- Prediction dashboard
- Metadata management
Internet Facing: YesReference: Mauri, L., & Damiani, E. (2022). Modeling Threats to AI-ML Systems Using STRIDE. Sensors, 22(17).
Case Study 10: Contact Tracing Applications
Case Study 10: Contact Tracing Applications
Type: Mobile Application
Complexity: HighDescription: Privacy-preserving contact tracing mobile application for pandemic response.Key Components:
- Bluetooth proximity detection
- Privacy-preserving cryptography
- Central notification server
- Health authority integration
Internet Facing: Yes
Case Study 11: Vehicular Fog Computing
Case Study 11: Vehicular Fog Computing
Type: Distributed Computing
Complexity: Very HighDescription: Fog computing architecture for vehicular networks with edge processing.Key Components:
- Vehicle-to-vehicle (V2V) communication
- Fog computing nodes
- Cloud backend integration
- Real-time data processing
Internet Facing: Yes
Case Study 12: Open Energy Monitor
Case Study 12: Open Energy Monitor
Type: IoT Application
Complexity: ModerateDescription: Open-source energy monitoring system for residential and commercial use.Key Components:
- Energy sensors
- Data logging and storage
- Web-based dashboard
- Analytics and reporting
Internet Facing: Yes
Case Study 13: E2EE Messaging Applications
Case Study 13: E2EE Messaging Applications
Type: Mobile Application
Complexity: HighDescription: End-to-end encrypted messaging application with privacy-focused architecture.Key Components:
- Client-side encryption
- Key exchange protocols
- Message routing servers
- Metadata minimization
Internet Facing: Yes
Case Study 14: Drone as a Service
Case Study 14: Drone as a Service
Type: Cyber-Physical System
Complexity: Very HighDescription: Commercial drone delivery service with autonomous flight and package management.Key Components:
- Autonomous navigation systems
- Flight control and telemetry
- Package tracking and management
- Ground control stations
Internet Facing: Yes
Case Study 15: Window Cleaning CPS
Case Study 15: Window Cleaning CPS
Type: Cyber-Physical System
Complexity: ModerateDescription: Automated window cleaning cyber-physical system for commercial buildings.Key Components:
- Robotic cleaning units
- Building management integration
- Safety monitoring systems
- Scheduling and control interface
Internet Facing: Partial
Evaluation Rubric
Each case study was evaluated using a structured rubric across 9 criteria:| Criteria | Weight | Description |
|---|---|---|
| DFD/Architecture | High | Presence and clarity of data flow diagrams |
| Application Type | High | Explicit or inferable application classification |
| Industry Sector | Medium | Clear industry context |
| Data Sensitivity | High | Classification of data sensitivity levels |
| Internet Facing | Medium | Internet exposure and connectivity |
| Compliance | Low | Regulatory requirements (often unknown) |
| Authentication | Medium | Authentication methods described |
| Technical Details | Medium | Specific technologies and versions |
| Threat Details | High | Quality and depth of threat descriptions |
Quality Tiers
- High Quality (36-45 points): Comprehensive documentation with explicit details
- Moderate Quality (26-35 points): Good coverage with some inferred attributes
- Low Quality (9-25 points): Limited information requiring significant inference
case_studies/rubric_criteria.mdBatch Input Generation
Each case study was transformed into structured JSON format for batch processing:JSON Schema Structure
See Batch Generation for complete schema details.Research Findings
The case study validation demonstrated:Coverage Analysis
- Application Types: 7 distinct types covered
- Industries: 12 different sectors represented
- Geographic Diversity: Sources from multiple countries and regions
- Complexity Range: From simple IoT devices to complex distributed systems
Quality Metrics
- High Quality: 3 case studies (20%)
- Moderate Quality: 10 case studies (67%)
- Low Quality: 2 case studies (13%)
Threat Model Validation
- Total Models Generated: 540 (30 batches × 18 threats × 15 case studies)
- STRIDE Coverage: 100% across all categories
- MITRE Mapping: Average 15.2 techniques per case study
- Consistency: High consistency across batch iterations
Accessing Case Studies
Using Case Studies
For Research
- Validate alternative threat modeling approaches
- Benchmark AI-generated threat models
- Develop new threat detection algorithms
- Train machine learning models
For Learning
- Study diverse threat modeling scenarios
- Understand STRIDE application across domains
- Analyze MITRE ATT&CK technique mappings
- Practice threat model evaluation
For Tool Development
- Test threat modeling tool capabilities
- Compare automated vs. manual approaches
- Evaluate coverage and completeness
- Measure performance at scale
Contributing Case Studies
To contribute new case studies:- Document the system with architecture diagram
- Extract key attributes using the evaluation rubric
- Create JSON schema following the established format
- Submit pull request with case study markdown and JSON