Using Malware Analysis to Identify Overlooked Security Requirements (MORE)
• Presentation
In this presentation, Nancy Mead explains how malware analysis can be used effectively to identify otherwise overlooked security requirements.
Publisher
Software Engineering Institute
Topic or Tag
Abstract
This presentation covers the problem of overlooked security requirements, how malware-analysis-driven use cases can be used to discover them, how these use cases are created, and case studies of their successful use. Also covered is information about the project currently underway to validate this approach and develop a tool.