search menu icon-carat-right cmu-wordmark

Using Malware Analysis to Identify Overlooked Security Requirements (MORE)

January 2017 Presentation
Nancy R. Mead

In this presentation, Nancy Mead explains how malware analysis can be used effectively to identify otherwise overlooked security requirements.

Publisher:

Software Engineering Institute

Abstract

This presentation covers the problem of overlooked security requirements, how malware-analysis-driven use cases can be used to discover them, how these use cases are created, and case studies of their successful use. Also covered is information about the project currently underway to validate this approach and develop a tool.