search menu icon-carat-right cmu-wordmark

Cybersecurity Engineering Research: Malware Analysis Collection

This research uses information about previous cyberattacks to enhance requirements elicitation for software development.

Publisher:

Software Engineering Institute

In traditional lifecycle models, use cases help developers identify requirements for their systems. Our research explores how developers can mine data from misuse cases to identify security requirements. Such requirements help developers address potential design flaws that can be exploited by attackers thereby resulting in more secure software.

SEI researchers and CMU students extended this work by creating an open-source tool, MORE, which allows developers to add information and search misuse cases, use cases, and overlooked requirements. Having this information enables developers to build more robust requirements that prevent security weaknesses in their products.

Using Malware Analysis to Identify Overlooked Security Requirements (MORE)

January 2017

In this presentation, Nancy Mead explains how malware analysis can be used effectively to identify otherwise overlooked security requirements.

Report Writer and Security Requirements Finder: User and Admin Manuals

June 2016

This report presents instructions for using the Malware-driven Overlooked Requirements (MORE) website applications.

Using Malware Analysis to Improve Security Requirements on Future Systems

August 2015

In this paper, the authors propose to improve how security requirements are identified.

A Method and Case Study for Using Malware Analysis to Improve Security Requirements

January 2015

In this article, the authors propose to enhance software development lifecycle models by implementing a process for including use cases based on previous cyberattacks.

Using Malware Analysis to Tailor SQUARE for Mobile Platforms

November 2014

This technical note explores the development of security requirements for the K-9 Mail application, an open source email client for the Android operating system.