Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Jose A. Morales
March 2017 - Presentation Using Malware Analysis to Identify Overlooked Security Requirements

Topics: Malware Analysis, Vulnerability Analysis

Authors: Nancy R. Mead, Jose A. Morales

This presentation describes initial research conducted by CERT and Carnegie Mellon to determine if malware report databases were amenable to automated processing to identify flaws

April 2016 - Article Compliance Signaling Games: Toward Modeling the Deterrence of Insider Threats

Topics: Insider Threat

Authors: William Casey, Jose A. Morales, Evan Wright, Quanyan Zhu (New York University), Bud Mishra (New York University)

In this paper, the authors analyze how the dynamics of compliance games illuminate the effectiveness or risks of an organizational policy.

November 2015 - Webinar Enhancing Mobile Device Security

Topics: Cybersecurity Engineering, Pervasive Mobile Computing

Authors: Jose A. Morales

Jose Morales discusses mobile device security enhancements with defensive and offensive uses.

August 2015 - Conference Paper Using Malware Analysis to Improve Security Requirements on Future Systems

Topics: Software Assurance, Cybersecurity Engineering

Authors: Nancy R. Mead, Jose A. Morales

In this paper, the authors propose to improve how security requirements are identified.

January 2015 - Article A Method and Case Study for Using Malware Analysis to Improve Security Requirements

Topics: Software Assurance, Cybersecurity Engineering

Authors: Nancy R. Mead, Jose A. Morales, Gregory Paul Alice

In this article, the authors propose to enhance software development lifecycle models by implementing a process for including use cases based on previous cyberattacks.

May 2014 - Podcast Characterizing and Prioritizing Malicious Code

Topics: Malware Analysis

Authors: Jose A. Morales, Julia H. Allen

In this podcast, Jose Morales discusses how to prioritize malware samples, helping analysts to identify the most destructive malware to examine first.