icon-carat-right menu search cmu-wordmark

Using Malware Analysis in Security Requirements Elicitation

Collection
This collection contains information about using malware analysis to identify security requirements.
Publisher

Software Engineering Institute

Abstract

In traditional lifecycle models, use cases help developers identify requirements for their systems. Our research explores how developers can mine data from misuse cases to identify security requirements. Such requirements help developers address potential design flaws that can be exploited by attackers thereby resulting in more secure software.

SEI researchers and CMU students extended this work by creating an open-source tool, MORE, which allows developers to add information and search misuse cases, use cases, and overlooked requirements. Having this information enables developers to build more robust requirements that prevent security weaknesses in their products.

Collection Items