Autonomy and Counter-Autonomy
Blog Posts
Adversarial ML Threat Matrix: Adversarial Tactics, Techniques, and Common Knowledge of Machine Learning
This SEI Blog post introduces the Adversarial ML Threat Matrix, a list of tactics to exploit machine learning models, and guidance on defense against them.
• By Jonathan Spring
In CERT/CC Vulnerabilities
Comments on NIST IR 8269: A Taxonomy and Terminology of Adversarial Machine Learning
The U.S. National Institute of Standards and Technology (NIST) recently held a public comment period on their draft report on proposed taxonomy and terminology of Adversarial Machine Learning (AML)....
• By Jonathan Spring
In CERT/CC Vulnerabilities
Deep Learning, Agile-DevOps, and Cloud Security: The Top 10 Blog Posts of 2018
Every January on the SEI Blog, we present the 10 most-visited posts of the previous year. This year's top 10, which features posts published between January 1, 2018, and December …
• By Douglas C. Schmidt
In Cloud Computing

Translating Between Statistics and Machine Learning
This SEI Blog post explores the differences between statistics and machine learning and how to translate statistical models into machine learning models.
• By Zachary Kurtz
In Artificial Intelligence Engineering

Virtual Integration, Blockchain Programming, and Agile/DevOps: The Latest Work from the SEI
As part of an ongoing effort to keep you informed about our latest work, this blog post summarizes some recently published SEI reports, podcasts, and presentations highlighting our work in …
• By Douglas C. Schmidt

Implications and Mitigation Strategies for the Loss of End-Entity Private Keys
When a private key in a public-key infrastructure (PKI) environment is lost or stolen, compromised end-entity certificates can be used to impersonate a principal that is associated with it....
• By Aaron Reffett, Thomas Scanlon


Bitcoin, Blockchain, Machine Learning, and Ransomware: The Top 10 Posts of 2017
Each year since the blog's inception, we present the 10 most-visited posts of the year in descending order ending with the most popular post. In this blog post, we present …
• By Douglas C. Schmidt

Inference of Memory Bounds: Preventing the Next Heartbleed
Learn about research aimed at detecting intended memory bounds of given pointers, helping to prevent vulnerabilities like HeartBleed in this SEI Blog post.
• By Will Klieber
In Secure Development
Supply Chain Risk Management, Network Situational Awareness, Software Architecture, and Network Time Protocol: The Latest Work from the SEI
This SEI Blog post highlights the latest research on supply chain risk management, network situational awareness, software architecture, and network time protocol.
• By Douglas C. Schmidt

Army Robotics in the Military
Discover how SEI researchers created an innovative environment within ROS-M to develop unmanned systems quickly in this SEI Blog post.
• By Jonathan Chu
