icon-carat-right menu search cmu-wordmark

Using Malware Analysis to Identify Overlooked Security Requirements (MORE)

Presentation
In this presentation, Nancy Mead explains how malware analysis can be used effectively to identify otherwise overlooked security requirements.
Publisher

Software Engineering Institute

Abstract

This presentation covers the problem of overlooked security requirements, how malware-analysis-driven use cases can be used to discover them, how these use cases are created, and case studies of their successful use. Also covered is information about the project currently underway to validate this approach and develop a tool.