Carnegie Mellon University
Browse

Report Writer and Security Requirements Finder: User and Admin Manuals

Download (3.5 MB)
report
posted on 2022-02-02, 17:55 authored by Nancy MeadNancy Mead, Anand Sankalp, Gupta Anurag, Priyam Swati, Yaobin Wen, Walid El Baroni

This report presents instructions for using the Malware-driven Overlooked Requirements (MORE) website applications. The site enables requirements engineers and architects to bring the benefit of malware attack analysis to their own product development. They can examine reports of exploited vulnerabilities, frequently augmented by relevant misuse cases, use cases, and overlooked security requirements (MUO) that site contributors have posted. From this data they can search the site to identify security requirements suitable to their own projects. They can also contribute related content and new reports.

Users can interact with the site through two applications documented here. The Security Requirement Finder (SERF) allows site contributors to build on malware exploit reports, add MUOs while referencing Common Weakness Enumeration (CWE). The Report Writer application connects to SERF and aids contributors in adding MUOs to the exploit reports.

Instructions on performing these activities in both applications are presented here, as well as guides for performing admin tasks associated with the applications.Keywords: Malware-driven Overlooked Requirements, MORE, Common Weakness Enumeration, CWE.

History

Publisher Statement

This material is based upon work funded and supported by the Department of Defense under Contract No. FA8702-15-D-0002 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. The view, opinions, and/or findings contained in this material are those of the author(s) and should not be construed as an official Government position, policy, or decision, unless designated by other documentation. References herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by Carnegie Mellon University or its Software Engineering Institute. This report was prepared for the SEI Administrative Agent AFLCMC/AZS 5 Eglin Street Hanscom AFB, MA 01731-2100 NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN "AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution. Please see Copyright notice for non-US Government use and distribution.

Date

2016-06-30

Copyright Statement

Copyright 2016 Carnegie Mellon University.

Usage metrics

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC