2017 SEI Year in Review Resources
• Collection
Publisher
Software Engineering Institute
Abstract
Thank you for reading the 2017 SEI Year in Review. The following resources provide more information about the topics addressed in individual articles in the Year in Review. The Table of Contents presents the 2017 SEI Year in Review article title followed by the related resources. A list of links at the bottom of the page provide author information and brief summaries for each item.
Using Ground-Truth Data Sets as Engines of Innovation
Ultra-Large-Scale Systems: More than a Decade of Influence
Bridging Science and Practice to Build Cybersecurity Knowledge and Skills
- Using Serious Games (Cyber Kinetic Effects Integration)
- STEPfwd (cyber workforce research and development platform)
Making Biometric Data Extraction Mission Practical
Getting a Handle on Big Learning Platform Performance
Building Trust Between Humans and Autonomous Systems
SEI Research Combats Mounting Acquisition Costs
Reporting DoD Network Vulnerabilities: It Just Got Easier
Assuring Autonomous Systems that Operate in Mission Environments
Pushing R&D to the Front Lines
Enabling Elusive Systems: Adaptive Cyber Defense for Networks
A Fighting Chance: Arming the Analyst in the Age of Big Data
Automated Code Analysis and Transformation
Building the Cyber Capacity of International Partners
Collection Items

What will the Robot do Next?
• Presentation
By Jonathan Chu
Presentation on research to build algorithms that allow robots to explain their behaviors to users and adapt their behavior during execution to enable users to accurately predict what they will …
Learn More
Certifiable Runtime Assurance of Distributed Real-Time Systems
• Conference Paper
By Sagar Chaki, Dionisio de Niz
This paper presents two challenging problems guiding research on developing a provably correct approach for runtime assurance of distributed real-time embedded systems.
Read
The CERT Guide to Coordinated Vulnerability Disclosure
• Special Report
By Allen D. Householder, Garret Wassermann, Art Manion, Christopher King
This guide provides an introduction to the key concepts, principles, and roles necessary to establish a successful Coordinated Vulnerability Disclosure process. It also provides insights into how CVD can go …
Read
Events, Relationships, and Script Learning for Situational Awareness
• Poster
By Edwin J. Morris
Poster for research into using machine learning to extract patterns from high volumes of textual data
Download
Department of Defense Software Factbook
• Technical Report
By Brad Clark, Christopher Miller, James McCurley, David Zubrow, Rhonda Brown, Mike Zuccher (No Affiliation)
In this report, the Software Engineering Institute has analyzed data related to DoD software projects and translated it into information that is frequently sought-after across the DoD.
Read
Why Does Software Cost So Much? Towards a Causal Model
• Poster
By Robert W. Stoddard, Michael D. Konrad
Poster on research to build an actionable, full causal model of software cost factors
Download
Cyber Affordance Visualization in Augmented Reality
• Poster
By Josh Hammerstein, Jeff Mattson
Poster on research to integrate cyber effects into tactical decision-making for soldiers
Download
Design Pattern Recovery from Malware Binaries Poster (SEI 2015 Research Review)
• Poster
By Sam Weber
This poster displays three tools for static analysis.
Download
CERT BFF: From Start to PoC
• Presentation
By Will Dormann
This presentation describes the CERT Basic Fuzzing Framework (BFF) from start to PoC.
Learn More
Automated Code Repair Based on Inferred Specifications
• Conference Paper
By William Klieber, William Snavely
In this paper, the authors describe automated repairs for three types of bugs: integer overflows, missing array bounds checks, and missing authorization checks.
Read