2016-208 – Using Malware Analysis to Identify Overlooked Security Requirements (MORE)

Method and tool for using malware analysis results to Identify overlooked security requirements. Description and papers can be found here: http://www.cert.org/cybersecurity-engineering/research security-requirements-elicitation.cfm. The executable tool can be found here http://report-writer.herokuapp.com/ and here http://serf-sei.herokuapp.com/ Raymond Taylor rtaylor@andrew.cmu.edu 412-268-2000

Related Blog

Smart, interactive desk

Get ready to take your space management game to the next level with the University of Glasgow’s innovative project! By combining the

Mechanical Hamstring™

University of Delaware Technology Overview This device was created to allow athletes who suffer a hamstring strain to return to the field

Join Our Newsletter

                                                   Receive Innovation Updates, New Listing Highlights And More