Using Malware Analysis to Identify Overlooked Security Requirements (MORE)
January 2017 • Presentation
Nancy R. Mead
In this presentation, Nancy Mead explains how malware analysis can be used effectively to identify otherwise overlooked security requirements.
Abstract
This presentation covers the problem of overlooked security requirements, how malware-analysis-driven use cases can be used to discover them, how these use cases are created, and case studies of their successful use. Also covered is information about the project currently underway to validate this approach and develop a tool.