Architecture description
Here you will find the task of participants and the documentation they used for support (also included in the "welcome package" on site of the experiment):
Lab instruction slides
Task
Printed book chapters according to assigned treatment: Shostack, Adam. Threat modeling: Designing for security. John Wiley & Sons, 2014. (Chapter 3: per element and per interaction)