Autonomy and Counter-Autonomy
Blog Posts
Six Dimensions of Trust in Autonomous Systems
This post chronicles the adoption and growth of autonomous systems and provides six considerations for establishing trust.
Read More•By Paul Nielsen
In Software Engineering Research and Development
Adversarial ML Threat Matrix: Adversarial Tactics, Techniques, and Common Knowledge of Machine Learning
This SEI Blog post introduces the Adversarial ML Threat Matrix, a list of tactics to exploit machine learning models, and guidance on defense against them.
Read More•By Jonathan Spring
In CERT/CC Vulnerabilities
Comments on NIST IR 8269: A Taxonomy and Terminology of Adversarial Machine Learning
The U.S. National Institute of Standards and Technology (NIST) recently held a public comment period on their draft report on proposed taxonomy and terminology of Adversarial Machine Learning (AML)....
Read More•By Jonathan Spring
In CERT/CC Vulnerabilities
Deep Learning, Agile-DevOps, and Cloud Security: The Top 10 Blog Posts of 2018
Every January on the SEI Blog, we present the 10 most-visited posts of the previous year. This year's top 10, which features posts published between January 1, 2018, and December …
Read More•By Douglas Schmidt (Vanderbilt University)
In Cloud Computing
Translating Between Statistics and Machine Learning
This SEI Blog post explores the differences between statistics and machine learning and how to translate statistical models into machine learning models.
Read More•By Zachary Kurtz
In Artificial Intelligence Engineering
Virtual Integration, Blockchain Programming, and Agile/DevOps: The Latest Work from the SEI
As part of an ongoing effort to keep you informed about our latest work, this blog post summarizes some recently published SEI reports, podcasts, and presentations highlighting our work in …
Read More•By Douglas Schmidt (Vanderbilt University)
Implications and Mitigation Strategies for the Loss of End-Entity Private Keys
When a private key in a public-key infrastructure (PKI) environment is lost or stolen, compromised end-entity certificates can be used to impersonate a principal that is associated with it....
Read More•By Aaron K. Reffett, Tom Scanlon
Bitcoin, Blockchain, Machine Learning, and Ransomware: The Top 10 Posts of 2017
Each year since the blog's inception, we present the 10 most-visited posts of the year in descending order ending with the most popular post. In this blog post, we present …
Read More•By Douglas Schmidt (Vanderbilt University)
Inference of Memory Bounds: Preventing the Next Heartbleed
Learn about research aimed at detecting intended memory bounds of given pointers, helping to prevent vulnerabilities like HeartBleed in this SEI Blog post.
Read More•By William Klieber
In Secure Development
8 At-Risk Emerging Technologies
Identifying 8 emerging technologies at risk for security vulnerabilities, this SEI Blog post covers autonomous systems, AI, 5G networks and more.
Read More