DID YOU KNOW? DTIC has over 3.5 million final reports on DoD funded research, development, test, and evaluation activities available to our registered users. Click
HERE to register or log in.
Accession Number:
AD1046660
Title:
Report Writer and Security Requirements Finder: User and Admin Manuals
Descriptive Note:
Technical Report
Corporate Author:
CARNEGIE-MELLON UNIV PITTSBURGH PA PITTSBURGH United States
Report Date:
2016-06-15
Pagination or Media Count:
95.0
Abstract:
This report presents instructions for using the Malware-driven Overlooked Requirements MORE website applications. The site enables requirements engineers and architects to bring the benefit of malware attack analysis to their own product development. They can examine reports of exploited vulnerabilities, frequently augmented by relevant misuse cases, use cases, and overlooked security requirements MUO that site contributors have posted. From this data they can search the site to identify security requirements suitable to their own projects. They can also contribute related content and new reports. Users can interact with the site through two applications documented here. The Security Requirement Finder SERF allows site contributors to build on malware exploit reports, add MUOs while referencing Common Weakness Enumeration CWE. The Report Writer application connects to SERF and aids contributors in adding MUOs to the exploit reports. Instructions on performing these activities in both applications are presented here, as well as guides for performing administrative tasks associated with the applications.
Distribution Statement:
APPROVED FOR PUBLIC RELEASE