{"id":1178,"date":"2021-10-29T11:39:10","date_gmt":"2021-10-29T15:39:10","guid":{"rendered":"https:\/\/carleton.ca\/cybersea\/?page_id=1178"},"modified":"2026-01-26T10:42:04","modified_gmt":"2026-01-26T15:42:04","slug":"merak","status":"publish","type":"page","link":"https:\/\/carleton.ca\/cybersea\/merak\/","title":{"rendered":"Merak: Asset Threat Analysis Tool"},"content":{"rendered":"\n<section class=\"w-screen px-6 cu-section cu-section--white ml-offset-center md:px-8 lg:px-14\">\n    <div class=\"space-y-6 cu-max-w-child-5xl  md:space-y-10 cu-prose-first-last\">\n\n            <div class=\"cu-textmedia flex flex-col lg:flex-row mx-auto gap-6 md:gap-10 my-6 md:my-12 first:mt-0 max-w-5xl\">\n        <div class=\"justify-start cu-textmedia-content cu-prose-first-last\" style=\"flex: 0 0 100%;\">\n            <header class=\"font-light prose-xl cu-pageheader md:prose-2xl cu-component-updated cu-prose-first-last\">\n                                    <h1 class=\"cu-prose-first-last font-semibold !mt-2 mb-4 md:mb-6 relative after:absolute after:h-px after:bottom-0 after:bg-cu-red after:left-px text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] pb-5 after:w-10 text-cu-black-700 not-prose\">\n                        Merak: Asset Threat Analysis Tool\n                    <\/h1>\n                \n                                \n                            <\/header>\n\n                    <\/div>\n\n            <\/div>\n\n    <\/div>\n<\/section>\n\n<h2 id=\"merak-asset-threat-analysis-tool\" class=\"wp-block-heading\">Merak: Asset Threat Analysis Tool<\/h2>\n\n\n\n<p><em>Merak<\/em> is a web-based threat analysis tool that aims to estimate a software system&#8217;s asset threat landscape by leveraging external security data sources such as National Vulnerability Database, MITRE&#8217;s ATT&amp;CK, and the Canadian Centre for Cyber Security Alerts and Advisories.<\/p>\n\n\n\n<p class=\"Text__Paragraph-sc-67o2k-0 Text__ParagraphSmall-sc-67o2k-1 huuIWf JunBV\">Merak helps system architects, developers, evaluators, and certifiers evaluate the adequacy of security requirements and design decisions associated with each asset of their system. Merak does this by leveraging external data sources and machine learning techniques such as Natural Language Processing to analyze the provided requirements and design specifications and identify potential threats that the asset could face based on various external security data sources such as the National Vulnerability Database. Merak visualizes the findings from its analysis to help practitioners improve their security requirements and design decisions as relevant in their operational context.<\/p>\n\n\n\n<p class=\"Text__Paragraph-sc-67o2k-0 Text__ParagraphSmall-sc-67o2k-1 huuIWf JunBV\">For example, if the asset under consideration is a server, and external vulnerability data shows that certain server links are vulnerable to man- in-the-middle attacks, a new security requirement could be added indicating that those links need to be encrypted, if this requirement does not already exist.<\/p>\n\n\n\n<h3 id=\"related-publications\" class=\"wp-block-heading\">Related Publications<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Joe Samuel, Jason Jaskolka, and George O.M. Yee. <a href=\"https:\/\/ieeexplore.ieee.org\/document\/9452029\">Leveraging external data sources to enhance secure system design<\/a>. In <em>Proceedings of the 2021 Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge<\/em>, RDAAPS 2021, pages 1\u20138, Hamilton, ON, Canada, 2021.<\/li>\n\n\n\n<li>Joe Samuel. <a href=\"https:\/\/doi.org\/10.22215\/etd\/2021-14669\">A Data-Driven Approach to Evaluate the Security of System Designs<\/a>. Master&#8217;s Thesis, Carleton University, Ottawa, ON, Canada, 2021.<\/li>\n<\/ul>\n\n\n\n<h3 id=\"try-merak\" class=\"wp-block-heading\">Try Merak<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/merak.compass.carleton.ca\/\">https:\/\/merak.compass.carleton.ca\/<\/a><\/li>\n<\/ul>\n\n\n\n<h3 id=\"screenshots\" class=\"wp-block-heading\">Screenshots<\/h3>\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\"><figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"2880\" height=\"1640\" data-id=\"1180\" src=\"https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-AssetInformation.png\" class=\"wp-image-1180\" srcset=\"https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-AssetInformation.png 2880w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-AssetInformation-160x91.png 160w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-AssetInformation-240x137.png 240w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-AssetInformation-768x437.png 768w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-AssetInformation-400x228.png 400w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-AssetInformation-1536x875.png 1536w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-AssetInformation-2048x1166.png 2048w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-AssetInformation-360x205.png 360w\" sizes=\"auto, (max-width: 2880px) 100vw, 2880px\" \/><\/figure>\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"2880\" height=\"1628\" data-id=\"1182\" src=\"https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-SecurityRequirements.png\" class=\"wp-image-1182\" srcset=\"https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-SecurityRequirements.png 2880w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-SecurityRequirements-160x90.png 160w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-SecurityRequirements-240x136.png 240w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-SecurityRequirements-768x434.png 768w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-SecurityRequirements-400x226.png 400w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-SecurityRequirements-1536x868.png 1536w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-SecurityRequirements-2048x1158.png 2048w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-SecurityRequirements-360x204.png 360w\" sizes=\"auto, (max-width: 2880px) 100vw, 2880px\" \/><\/figure>\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"2880\" height=\"1636\" data-id=\"1181\" src=\"https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-DesignDecisions.png\" class=\"wp-image-1181\" srcset=\"https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-DesignDecisions.png 2880w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-DesignDecisions-160x91.png 160w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-DesignDecisions-240x136.png 240w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-DesignDecisions-768x436.png 768w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-DesignDecisions-400x227.png 400w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-DesignDecisions-1536x873.png 1536w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-DesignDecisions-2048x1163.png 2048w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-DesignDecisions-360x205.png 360w\" sizes=\"auto, (max-width: 2880px) 100vw, 2880px\" \/><\/figure>\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"2876\" height=\"1586\" data-id=\"1183\" src=\"https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-ThreatReport.png\" class=\"wp-image-1183\" srcset=\"https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-ThreatReport.png 2876w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-ThreatReport-160x88.png 160w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-ThreatReport-240x132.png 240w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-ThreatReport-768x424.png 768w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-ThreatReport-400x221.png 400w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-ThreatReport-1536x847.png 1536w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-ThreatReport-2048x1129.png 2048w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Merak-ThreatReport-360x199.png 360w\" sizes=\"auto, (max-width: 2876px) 100vw, 2876px\" \/><\/figure><\/figure>\n\n\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Merak: Asset Threat Analysis Tool Merak is a web-based threat analysis tool that aims to estimate a software system&#8217;s asset threat landscape by leveraging external security data sources such as National Vulnerability Database, MITRE&#8217;s ATT&amp;CK, and the Canadian Centre for Cyber Security Alerts and Advisories. Merak helps system architects, developers, evaluators, and certifiers evaluate the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_cu_dining_location_slug":"","footnotes":"","_links_to":"","_links_to_target":""},"cu_page_type":[52],"class_list":["post-1178","page","type-page","status-publish","hentry","cu_page_type-tools"],"acf":{"cu_post_thumbnail":false},"_links":{"self":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/pages\/1178","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/comments?post=1178"}],"version-history":[{"count":3,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/pages\/1178\/revisions"}],"predecessor-version":[{"id":1853,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/pages\/1178\/revisions\/1853"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media?parent=1178"}],"wp:term":[{"taxonomy":"cu_page_type","embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/cu_page_type?post=1178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}