Cybersecurity Engineering Research: Malware Analysis Collection
This research uses information about previous cyberattacks to enhance requirements elicitation for software development.
Software Engineering Institute
In traditional lifecycle models, use cases help developers identify requirements for their systems. Our research explores how developers can mine data from misuse cases to identify security requirements. Such requirements help developers address potential design flaws that can be exploited by attackers thereby resulting in more secure software.
SEI researchers and CMU students extended this work by creating an open-source tool, MORE, which allows developers to add information and search misuse cases, use cases, and overlooked requirements. Having this information enables developers to build more robust requirements that prevent security weaknesses in their products.
In this presentation, Nancy Mead explains how malware analysis can be used effectively to identify otherwise overlooked security requirements.
This report presents instructions for using the Malware-driven Overlooked Requirements (MORE) website applications.
In this paper, the authors propose to improve how security requirements are identified.
In this article, the authors propose to enhance software development lifecycle models by implementing a process for including use cases based on previous cyberattacks.
This technical note explores the development of security requirements for the K-9 Mail application, an open source email client for the Android operating system.