2017 SEI Year in Review Resources
• Collection
Publisher
Software Engineering Institute
Abstract
Thank you for reading the 2017 SEI Year in Review. The following resources provide more information about the topics addressed in individual articles in the Year in Review. The Table of Contents presents the 2017 SEI Year in Review article title followed by the related resources. A list of links at the bottom of the page provide author information and brief summaries for each item.
Using Ground-Truth Data Sets as Engines of Innovation
Ultra-Large-Scale Systems: More than a Decade of Influence
Bridging Science and Practice to Build Cybersecurity Knowledge and Skills
- Using Serious Games (Cyber Kinetic Effects Integration)
- STEPfwd (cyber workforce research and development platform)
Making Biometric Data Extraction Mission Practical
Getting a Handle on Big Learning Platform Performance
Building Trust Between Humans and Autonomous Systems
SEI Research Combats Mounting Acquisition Costs
Reporting DoD Network Vulnerabilities: It Just Got Easier
Assuring Autonomous Systems that Operate in Mission Environments
Pushing R&D to the Front Lines
Enabling Elusive Systems: Adaptive Cyber Defense for Networks
A Fighting Chance: Arming the Analyst in the Age of Big Data
Automated Code Analysis and Transformation
Building the Cyber Capacity of International Partners
Collection Items
Why Does Software Cost So Much? Toward a Causal Model (March 2017)
• Presentation
By Robert W. Stoddard, Michael D. Konrad, Bill Nichols, David Danks (Carnegie Mellon University), Kuh Zhang (Carnegie Mellon University)
This presentation shares early research results that may confirm some well-known drivers of DoD software cost and debunk others.
Learn MoreCommon Sense Guide to Mitigating Insider Threats, Fifth Edition
• Technical Report
By Matthew L. Collins, Michael C. Theis, Randall F. Trzeciak, Jeremy R. Strozer, Jason W. Clark, Daniel L. Costa, Tracy Cassidy, Michael J. Albrethsen, Andrew P. Moore
Presents recommendations for mitigating insider threat based on CERT's continued research and analysis of over 1,000 cases.
ReadQuantifying Uncertainty in Early Lifecycle Cost Estimation (QUELCE)
• Technical Report
By Robert Ferguson, Dennis Goldenson, James McCurley, Robert W. Stoddard, David Zubrow, Debra Anderson
The method of quantifying uncertainty described in this report synthesizes scenario building, Bayesian Belief Network (BBN) modeling and Monte Carlo simulation into an estimation method that quantifies uncertainties, allows subjective …
ReadDoD Software Factbook
• White Paper
By Brad Clark, James McCurley, David Zubrow
This DoD Factbook is an initial analysis of software engineering data from the perspective of policy and management questions about software projects.
ReadUltra-Large-Scale Systems: The Software Challenge of the Future
• Book
By Peter H. Feiler, Richard P. Gabriel (Sun Microsystems), John B. Goodenough, Richard C. Linger (Oak Ridge National Laboratory), Thomas A. Longstaff, Rick Kazman, Mark H. Klein, Linda M. Northrop, Douglas Schmidt (Vanderbilt University), Kevin Sullivan (University of Virginia), Kurt C. Wallnau
Ultra-Large-Scale Systems: The Software Challenge of the Future is the product of a 12-month study of ultra-large-scale (ULS) systems software.
ReadUtilizing Serious Games to Assist Motivation and Education
• Poster
By Rotem D. Guttman
This poster illustrates gamified training created for the DoD.
DownloadReal-Time Extraction of Heart Rate from Video
• Brochure
By Software Engineering Institute
This technical sheet details our project to extract heart rate from commodity video in real time.
Learn MoreMicro-Expressions: More than Meets the Eye
• Presentation
By Satya Venneti, Oren Wright
Presentation on research to build an accurate, automatic micro-expression analysis prototype that outperforms humans in spotting and recognizing facial micro-expressions in near real time
Learn MoreMeasuring Performance of Big Learning Workloads
• Poster
By Scott McMillan
Poster on research to build a performance measurement workbench with tools to measure and report performance of large-scale ML platforms
DownloadWhy Did the Robot Do That?
• Poster
By Stephanie Rosenthal
Poster of presentation delivered at the SEI Research Review 2016.
DownloadWhat will the Robot do Next?
• Presentation
By Jonathan Chu
Presentation on research to build algorithms that allow robots to explain their behaviors to users and adapt their behavior during execution to enable users to accurately predict what they will …
Learn MoreCertifiable Runtime Assurance of Distributed Real-Time Systems
• Conference Paper
By Sagar Chaki, Dionisio de Niz
This paper presents two challenging problems guiding research on developing a provably correct approach for runtime assurance of distributed real-time embedded systems.
ReadThe CERT Guide to Coordinated Vulnerability Disclosure
• Special Report
By Allen D. Householder, Garret Wassermann, Art Manion, Christopher King
This guide provides an introduction to the key concepts, principles, and roles necessary to establish a successful Coordinated Vulnerability Disclosure process. It also provides insights into how CVD can go …
ReadEvents, Relationships, and Script Learning for Situational Awareness
• Poster
By Edwin J. Morris
Poster for research into using machine learning to extract patterns from high volumes of textual data
DownloadDepartment of Defense Software Factbook
• Technical Report
By Brad Clark, Christopher Miller, James McCurley, David Zubrow, Rhonda Brown, Mike Zuccher (No Affiliation)
In this report, the Software Engineering Institute has analyzed data related to DoD software projects and translated it into information that is frequently sought-after across the DoD.
ReadWhy Does Software Cost So Much? Towards a Causal Model
• Poster
By Robert W. Stoddard, Michael D. Konrad
Poster on research to build an actionable, full causal model of software cost factors
DownloadCyber Affordance Visualization in Augmented Reality
• Poster
By Josh Hammerstein, Jeff Mattson
Poster on research to integrate cyber effects into tactical decision-making for soldiers
DownloadDesign Pattern Recovery from Malware Binaries Poster (SEI 2015 Research Review)
• Poster
By Sam Weber
This poster by Sam Weber illustrates three tools for static analysis.
DownloadCERT BFF: From Start to PoC
• Presentation
By Will Dormann
This presentation describes the CERT Basic Fuzzing Framework (BFF) from start to PoC.
Learn MoreAutomated Code Repair Based on Inferred Specifications
• Conference Paper
By William Klieber, William Snavely
In this paper, the authors describe automated repairs for three types of bugs: integer overflows, missing array bounds checks, and missing authorization checks.
Read