search menu icon-carat-right cmu-wordmark

Using Malware Analysis to Identify Overlooked Security Requirements (MORE)

In this presentation, Nancy Mead explains how malware analysis can be used effectively to identify otherwise overlooked security requirements.

Software Engineering Institute


This presentation covers the problem of overlooked security requirements, how malware-analysis-driven use cases can be used to discover them, how these use cases are created, and case studies of their successful use. Also covered is information about the project currently underway to validate this approach and develop a tool.