Report Writer and Security Requirements Finder: User and Admin Manuals
CARNEGIE-MELLON UNIV PITTSBURGH PA PITTSBURGH United States
Pagination or Media Count:
This report presents instructions for using the Malware-driven Overlooked Requirements MORE website applications. The site enables requirements engineers and architects to bring the benefit of malware attack analysis to their own product development. They can examine reports of exploited vulnerabilities, frequently augmented by relevant misuse cases, use cases, and overlooked security requirements MUO that site contributors have posted. From this data they can search the site to identify security requirements suitable to their own projects. They can also contribute related content and new reports. Users can interact with the site through two applications documented here. The Security Requirement Finder SERF allows site contributors to build on malware exploit reports, add MUOs while referencing Common Weakness Enumeration CWE. The Report Writer application connects to SERF and aids contributors in adding MUOs to the exploit reports. Instructions on performing these activities in both applications are presented here, as well as guides for performing administrative tasks associated with the applications.
- Computer Programming and Software
- Computer Systems Management and Standards