Archive: 2023
Join the SEI and White House OSTP to Explore the Future of Software and AI Engineering
The SEI and the White House OSTP will co-host a workshop to inform a community strategy for building and maintaining U.S. leadership in software engineering and artificial intelligence (AI) engineering.
Read More•By Anita Carleton, John E. Robert, Mark H. Klein, Douglas Schmidt (Vanderbilt University), Erin Harper
In Software Engineering Research and Development
Detecting and Grouping Malware Using Section Hashes
Current malware detection systems evaluate elements in a file or evaluate the file as a whole. New research shows other avenues for malware detection exist, specifically, breaking up the file …
Read More•By Timur D. Snoke, Michael Jacobs
In Reverse Engineering for Malware Analysis
5 Challenges to Implementing DevSecOps and How to Overcome Them
The shift from project- to program-level thinking raises numerous challenges to DevSecOps implementation. This SEI Blog post articulates these challenges and ways to overcome them.
Read More•By Joe Yankel, Hasan Yasar
In DevSecOps
What’s Going On in My Program? 12 Rules for Conducting Assessments
This post provides 12 rules for successful program or project assessments.
Read More•By William E. Novak
UEFI: 5 Recommendations for Securing and Restoring Trust
This blog post expands on concerns brought to light from recent UEFI attacks, such as BlackLotus, and highlights 5 recommendations to secure and restore trust in the UEFI ecosystem.
Read More•By Vijay S. Sarvepalli
In CERT/CC Vulnerabilities
The Latest Work from the SEI: Rust, DevSecOps, AI, and Penetration Testing
Learn more about the SEI's latest work in penetration testing, model-based design for cyber-physical systems, UEFI, and DevSecOps.
Read More•By Douglas Schmidt (Vanderbilt University)
In Software Engineering Research and Development
The Seven Virtues of Reconciling Agile and Earned Value Management (EVM)
This post discusses the interactions between Agile software development and earned value management (EVM).
Read More•By Stephen Wilson, Patrick R. Place, Keith Korzec
In Agile
Using Game Theory to Advance the Quest for Autonomous Cyber Threat Hunting
This SEI Blog post describes an effort to apply game theory to the development of algorithms suitable for informing a fully autonomous threat hunting capability and introduces the concept of …
Read More•By Phil Groce
In Cybersecurity Engineering
Contextualizing End-User Needs: How to Measure the Trustworthiness of an AI System
As potential applications of artificial intelligence (AI) continue to expand, the question remains: will users want the technology and trust it? This blog post explores how to measure the trustworthiness …
Read More•By Carrie Gardner, Katherine-Marie Robinson, Carol J. Smith, Alexandrea Steiner
In Artificial Intelligence Engineering
A Repository of Common Penetration-Testing Weaknesses
Penetration testing is an important step in identifying weaknesses in an organization’s IT infrastructure. This post introduces a penetration-testing findings repository now publicly available on GitHub.
Read More•By Marisa Midler, Samantha Chaves
SEI Blog Archive
Recent
Year