Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword
Like this
0Activity
0 of .
Results for:
No results containing your search query
P. 1
Job Analysis, Malicious code Reverse Engineers, Expert

Job Analysis, Malicious code Reverse Engineers, Expert

Ratings:
(0)
|Views: 4|Likes:
This report describes individual and team factors that enable, encumber, or halt the development of malicious-code reverse engineering expertise.
This report describes individual and team factors that enable, encumber, or halt the development of malicious-code reverse engineering expertise.

More info:

Categories:Types, Brochures
Published by: Software Engineering Institute Publications on Jun 03, 2014
Copyright:Traditional Copyright: All rights reserved

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

06/10/2014

pdf

text

original

 
 Job Analysis Results for Malicious-Code Reverse Engineers: A Case Study
 
Jennifer Cowley
May 2014 TECHNICAL REPORT
CMU/SEI-2014-TR-002
CERT Division
 
 
Copyright 2014 Carnegie Mellon University This material is based upon work funded and supported by the Department of Defense under Contract  No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineer-ing Institute, a federally funded research and development center. Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the United States Department of Defense. This report was prepared for the SEI Administrative Agent AFLCMC/PZM 20 Schilling Circle, Bldg 1305, 3rd floor Hanscom AFB, MA 01731-2125  NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN “AS-IS” BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. This material has been approved for public release and unlimited distribution except as restricted be-low. Internal use:* Permission to reproduce this material and to prepare derivative works from this material for internal use is granted, provided the copyright and “No Warranty” statements are included with all reproductions and derivative works. External use:* This material may be reproduced in its entirety, without modification, and freely dis-tributed in written or electronic form without requesting formal permission. Permission is required for any other external and/or commercial use. Requests for permission should be directed to the Software Engineering Institute at  permission@sei.cmu.edu. * These restrictions do not apply to U.S. government entities. Carnegie Mellon
®
 and CERT
®
 are registered marks of Carnegie Mellon University. DM-0001119
 
 
CMU/SEI-2014-TR-002
 |
i
 
Table of Contents
Abstract vii
 
1
 
Introduction 1
 
2
 
Method 4
 
2.1
 
Step 1. Review existing literature. 4
 
2.1.1
 
Purpose and Overall Description 4
 
2.1.2
 
Method 4
 
2.2
 
Step 2. Conduct job analysis interviews and analyze results. 5
 
2.2.1
 
Purpose and Overall Description 5
 
2.2.2
 
Method 5
 
3
 
Analysis Method and Results 9
 
3.1
 
 Analysis Method 9
 
3.2
 
 Analysis Results 10
 
4
 
Conclusions and Key Insights for Stakeholders 18
 
5
 
Limitations 20
 
Appendix A
 
Potential Requirements 21
 
Appendix B
 
Raw Data from Interviews 27
 
Appendix C
 
Interview Materials 85
 
References 99
 

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->