2019 SEI Year in Review Resources
• Collection
Publisher
Software Engineering Institute
Topic or Tag
Abstract
Thank you for reading the 2019 SEI Year in Review. The following resources provide more information about the topics addressed in individual articles in the Year in Review. The Table of Contents presents the 2019 SEI Year in Review article titles followed by their related resources. The list of links at the bottom of the page provide author information and brief summaries for each item.
Go to the 2019 SEI Year in Review.
Table of Contents
SEI Team Wins 2019 ISLA Award
DoD Developer’s Guidebook for Software Assurance - Special Report
Program Manager's Guidebook for Software Assurance - Special Report
A Pivotal Moment: AI Engineering for Defense and National Security
AI Engineering: 11 Foundational Practices - White Paper
AI Engineering: 11 Foundational Practices for Decision Makers - SEI Blog
Defining AI Engineering - Video
AI Engineering - Web Page
Supporting AI Engineering Challenges in the DoD: Summarizing Aerial Surveillance Video
Summarizing and Searching Video: Patterns-of-Life Analysis - Poster
Summarizing and Searching Video: Geometry-Aware Visual Surveillance - Poster
Summarizing and Searching Video with Machine Learning - SEI Blog
Graph Convolutional Neural Networks to Bolster AI Analysis of Irregular Data
Graph Convolutional Neural Networks - Poster
Graph Convolutional Neural Networks - Presentation
SEI Collaborations Tackle Big-Data Analytics
Dynamic Parallelism for Simple and Efficient GPU Graph Algorithms - Conference Paper
Design and Implementation of the GraphBLAS Template Library (GBTL) - Presentation
Mathematical Foundations of the GraphBLAS - Conference Paper
Automated Code Generation for High-Performance Graph Libraries - Presentation
Spiral/AIML: Frontiers of Graph Processing in Linear Algebra - Poster
Spiral/AIML: Resource-Constrained Co-Optimization for High-Performance Data-Intensive Computing - Video
GraphBLAS Template Library (GBTL) - Software
Graph BLAS Forum - Web Page
SPIRAL Project Homepage - Web Page
Can We Trust Our Cyber-Physical Systems?
Cyber-Physical Systems - Book
Combining Symbolic Runtime Enforcers for Cyber-Physical Systems - Conference Paper
Have Your PI and Eat it Too: Practical Security on a Low-cost Ubiquitous Computing Platform - Conference Paper
Certifiable Distributed Runtime Assurance in Cyber-Physical Systems - SEI Blog
Design of Software Rejuvenation for CPS Security Using Invariant Sets - Conference Paper
Mixed-Trust Computing for Real-Time Systems - Conference Paper
uber eXtensible Micro-Hypervisor Framework - Software
Rapid Certifiable Trust - Presentation
Rapid Certifiable Trust - Poster
Rapid Certifiable Trust - Video
Building Damage Assessment Dataset Advances Machine Learning for Disaster Recovery
Creating xBD: A Dataset for Assessing Building Damage from Satellite Imagery - Academic Paper
xBD Dataset - Software
SEI to Transition AI Expertise to Humanitarian Assistance and Disaster Response Community - SEI News
AI in Humanitarian Assistance and Disaster Response - Podcast
SEI Researchers Help Design xView2 Machine Learning Competition - SEI News
The SEI Helps Shape Software Acquisition Policy Reform
Modernizing DoD Software Production - Presentation
Updated Pharos Binary Analysis Framework Speeds Malware Analysis
Pharos Binary Static Analysis Tools Released on GitHub - SEI Blog
Pharos - Software
Using Logic Programming to Recover C++ Classes and Methods from Compiled Executables - Article
Path Finding in Malicious Binaries: First in a Series - SEI Blog
Using OOAnalyzer to Reverse Engineer Object Oriented Code with Ghidra - SEI Blog
SEI’s CERT Division Releases New Version of Pharos Toolset - SEI News
SEI Report Reveals the State of U.S. Cyber Intelligence
Cyber Intelligence Tradecraft Report: The State of Cyber Intelligence Practices in the United States - Collection
Cyber Intelligence Report Outlines Best Practices and Biggest Challenges - Press Release
Cyber Intelligence: Best Practices and Biggest Challenges - Podcast
Bolstering Security with Cyber Intelligence - SEI Blog
Cyber Intelligence Study - Web Page
Cybersecurity Professionals Flex Their Muscles in SEI-Developed Competition
DevSecOps Takes DoD Software Development to the Next Level
The CERT DevSecOps Model: Building Secure Applications - Brochure
DevSecOps Implementation in the DoD: Barriers and Enablers - Webinar
DevSecOps Process and Implementation - Course
Building International Cybersecurity Capacity
CSIRT Resources - Collection
Cybersecurity Center Development - Web Page
Engaging the CSIRT Community: Cyber Capacity Building on a Global Scale - SEI Blog
Annual FIRST Conference on Computer Security Incident Handling - Web Page
NatCSIRT - Web Page
Predicting the Future of Quantum Computing
Verifying and Validating Mission-Critical Systems Using Quantum Computing - Web Page
Projecting Quantum Computational Advantage Versus Classical State of the Art - Presentation
Projecting Quantum Computational Advantage Versus Classical State of the Art - Video
Achieving the Quantum Advantage in Software - SEI Blog
Projecting NISQ-era quantum advantage with QAOA - Presentation
Maturity Model Certification to Improve Cybersecurity in the DoD Supply Chain
CMMC—Securing the DIB Supply Chain with the Cybersecurity Maturity Model Certification Process - Fact Sheet
An Introduction to the Cybersecurity Maturity Model Certification (CMMC) - SEI Blog
Cybersecurity Maturity Model Certification (CMMC) Part 2: Process Maturity's Role in Cybersecurity - SEI Blog
Beyond NIST SP 800-171: 20 Additional Practices in CMMC - SEI Blog
The DoD’s Cybersecurity Maturity Model Certification and Process Maturity - Webinar
CMMC Scoring Fact Sheet - Fact Sheet
Hitting the Ground Running: Reviewing the 17 CMMC Level 1 Practices - Webinar
AADL’s Research-to-Practice Pipeline Supports the Army Futures Command
Architecture Analysis & Design Language (AADL): SEI Resources - Collection
Architecture Analysis and Design Language - Web page
Integrated Safety and Security Engineering for Mission-Critical Systems - Presentation
Integrating Safety and Security Engineering for Mission-Critical Systems (2019) - Poster
Integrating Safety and Security Engineering for Mission-Critical Systems - Video
OSATE - Web Page
Subject: Architecture Analysis & Design Language (AADL) - SEI Blog Category
Managing Technical Debt for Modern Software Development
Managing Technical Debt with Data-Driven Analysis - Web Page
Architectural Technical Debt Library - Collection
Managing Technical Debt: Reducing Friction in Software Development - Book
Automatically Detecting Technical Debt Discussions with Machine Learning - SEI Blog
International Conference on Technical Debt TechDebt 2020 - Web Page
Subject: Technical Debt - SEI Blog Category
Collection Items
DoD Developer's Guidebook for Software Assurance
• Newsletter
By Software Engineering Institute
This SEI Bulletin talks about a new guidebook for software assurance written by Dr. William R. Nichols, Jr. and Dr. Thomas Scanlon.
ReadProgram Manager's Guidebook for Software Assurance
• Special Report
By Kenneth Nidiffer, Carol Woody, Timothy A. Chick
This guidebook helps program managers address the software assurance responsibilities critical in defending software-intensive systems, including mission threads and cybersecurity.
ReadAI Engineering: 11 Foundational Practices
• White Paper
By Software Engineering Institute
These recommendations help organizations that are beginning to build, acquire, and integrate artificial intelligence capabilities into business and mission systems.
ReadSEI Artificial Intelligence Engineering Roadmap
• Video
By Thomas A. Longstaff, Rotem D. Guttman
Tom Longstaff and Rotem Guttman walk through the Software Engineering Institute's plans for how to advance the science of artificial intelligence engineering.
WatchDefining AI Engineering
• Video
By Matt Gaston
Watch Dr. Matt Gaston, Director of the SEI Emerging Technology Center, and Professor Martial Hebert, Dean of CMU School of Computer Science and recognized world expert in computer vision, discuss …
WatchSummarizing and Searching Video: Patterns-of-Life Analysis
• Poster
By Edwin J. Morris
This poster describes experiments to use simulations to explore patterns-of-life analysis.
DownloadSummarizing and Searching Video: Geometry-Aware Visual Surveillance
• Poster
By Edwin J. Morris
This poster describes research to develop a moving-object tracker for video search.
DownloadSummarizing and Searching Video: Domain Adaptation
• Poster
By Edwin J. Morris
This poster describes research to enable the use of existing data sets to training detectors in low data environments.
DownloadSummarizing and Searching Video (2019)
• Video
By Edwin J. Morris, Rachel Brower-Sinning, Jeffrey Hansen
Watch SEI and CMU researchers discuss a way to improve the training of machine learning algorithms necessary for detecting, tracking, and recognizing patterns of objects in video.
WatchGraph Convolutional Neural Networks
• Poster
By Oren Wright
This poster describes research to use graph convolutional neural networks to extend deep learning.
DownloadGraph Convolutional Neural Networks
• Presentation
By Oren Wright
This project used graph signal processing formalisms to create new deep learning tools for graph convolutional neural networks (GCNNs).
Learn MoreGraph Convolutional Neural Networks
• Video
By Oren Wright
Watch SEI researcher Mr. Oren Wright discuss using graph signal processing formalisms to create new deep learning tools for graph convolutional neural networks (GCNNs) to answer the question "how does …
WatchDynamic Parallelism for Simple and Efficient GPU Graph Algorithms
• Conference Paper
By Peter Zhang (Indiana University), Eric Holk (Indiana University), John Matty, Samantha Misurda, Marcin Zalewski (Indiana University), Jonathan Chu, Scott McMillan, Andrew Lumsdaine (Indiana University)
Presented at the 2015 Supercomputing Conference, this paper shows that dynamic parallelism enables relatively high-performance graph algorithms for GPUs.
ReadDesign and Implementation of the GraphBLAS Template Library (GBTL)
• Presentation
By Scott McMillan, Samantha Misurda, Marcin Zalewski (Indiana University), Peter Zhang (Indiana University), Andrew Lumsdaine (Indiana University)
The design of the GraphBLAS Template Library separates graph algorithm development from performance tuning for heterogeneous high-performance computing architectures.
Learn MoreAutomated Code Generation for High-Performance Graph Libraries
• Presentation
By Scott McMillan
This FY2017 project builds on prior Line-funded research in the Patterns and Practices for Future Architectures.
Learn MoreMathematical Foundations of the GraphBLAS
• Conference Paper
By Jeremy Kepner (MIT Lincoln Laboratory), Peter Aaltonen (Indiana University), David Bader (Georgia Institute of Technology), Aydın Buluç (Lawrence Berkeley National Laboratory), Franz Franchetti (Carnegie Mellon University), John Gilbert (University of California, Santa Barbara), Dylan Hutchison (University of Washington), Manoj Kumar (IBM), Andrew Lumsdaine (Indiana University), Henning Meyerhenke (Karlsruhe Institute of Technology), Scott McMillan, Jose Moreira (IBM), John D. Owens (University of California, Davis), Carl Yang (University of California, Davis), Marcin Zalewski (Indiana University), Tim Mattson (Intel)
This paper introduces the mathematics of the GraphBLAS, which is being developed to bring matrix-based graph algorithms to the broadest possible audience.
ReadSpiral/AIML: Frontiers of Graph Processing in Linear Algebra
• Poster
By Scott McMillan, Franz Franchetti (Carnegie Mellon University)
This poster represents research to extend the use of linear algebra beyond simple graph traversal.
DownloadSpiral/AIML: Resource-Constrained Co-Optimization for High-Performance, Data-Intensive Computing
• Video
By Scott McMillan, Franz Franchetti (Carnegie Mellon University)
Watch SEI Principal Investigator, Dr. Scott McMillan, and research collaborator, CMU ECE Professor Franz Franchetti, discuss a community research effort to develop tools to reduce the prohibitive cost of implementing …
WatchCyber-Physical Systems
• Book
By Ragunathan (Raj) Rajkumar, Dionisio de Niz, Mark H. Klein
This book addresses Cyber-Physical Systems (CPS) challenges and innovations, it describes the foundations that underlie CPS, and offers guiding principles for all levels.
ReadRapid Certifiable Trust
• Presentation
By Dionisio de Niz
Rapid Certifiable Trust preserves cyber-physical system safety by verifying and protecting part of a system and enforcing constraints on unverified components.
Learn MoreRapid Certifiable Trust
• Poster
By Dionisio de Niz
This poster describes investigation into formal methods to automatically validate new technologies for safety.
DownloadRapid Certifiable Trust (video)
• Video
By Dionisio de Niz
Watch SEI principal investigator Dr. Dionisio de Niz discuss research on verification techniques to reduce the deployment time of cyber-physical systems such as unmanned vehicles and aircraft, by reducing the …
WatchAI in Humanitarian Assistance and Disaster Response
• Podcast
By Ritwik Gupta
Ritwik Gupta, a machine learning research scientist in the SEI's Emerging Technology Center, discusses the use of AI in humanitarian assistance and disaster response (HADR) efforts.
ListenModernizing DoD Software Production
• Presentation
By Jeff Boleng
This presentation discusses the progress being made by the Department of Defense (DoD) against the recommendations in the 2019 Defense Innovation Board's (DIB) study.
Learn MoreUsing Logic Programming to Recover C++ Classes and Methods from Compiled Executables
• Article
By Edward J. Schwartz, Cory Cohen, Michael Duggan, Jeff Gennari, Jeff Havrilla, Chuck Hines
This article describes OOAnalyzer, a system that statically recovers detailed C++ abstractions from executables in a scalable manner.
ReadCyber Intelligence Tradecraft Report: The State of Cyber Intelligence Practices in the United States (Study Report and Implementation Guides)
• Collection
By Jared Ettinger, April Galyardt, Ritwik Gupta, Daniel DeCapria, Eliezer Kanal, Dan J. Klinedinst, Deana Shick, Samuel J. Perl, Geoffrey B. Dobson, Geoff Sanders, Daniel L. Costa, Larry Rogers, Hollen Barmer, Jennifer Kane, Heather Evans, Erica Brandon, Andrew O. Mellinger
This report details the findings of a study the SEI conducted at the request of the United States Office of the Director of National Intelligence. In the report, we present …
Learn MoreCyber Intelligence: Best Practices and Biggest Challenges
• Podcast
By Jared Ettinger
Jared Ettinger, a cyber intelligence researcher in the SEI's Emerging Technology Center, discusses the findings of a report that outlines challenges and best practices in cyber intelligence.
ListenDevSecOps: Building Secure Applications
• Brochure
By Software Engineering Institute
DevOps is a modern software development approach where stakeholders and development and operations teams collaborate to improve efficiency and results.
Learn MoreBuild Secure Applications with DevSecOps
• Video
By Hasan Yasar
Watch Hasan Yasar discuss how to "Build Secure Applications with DevSecOps."
WatchDevSecOps Implementation in the DoD: Barriers and Enablers
• Webcast
By Hasan Yasar, Eileen Wrubel, Jeff Boleng
In this webcast, panelists discuss potential enablers of and barriers to using modern software development techniques and processes in the DoD or similar segregated environments.
WatchCSIRT Resources
• Collection
By Software Engineering Institute
These resources help Computer Security Incident Response Teams (CSIRTs) and those forming these teams.
Learn MoreWhat’s Going on with Near-Term Quantum Computing?
• Video
By Software Engineering Institute
This SEI Cyber Talk episode explains how quantum computing works, its current state, and how it might be used in both the near- and long-term future.
WatchProjecting Quantum Computational Advantage Versus Classical State of the Art
• Presentation
By Jason Larkin
This presentation reports on research to predict when (or whether) quantum computing will be mission-capable for hard combinatorial optimization problems in software V&V.
Learn MoreProjecting Quantum Computational Advantage Versus Classical State of the Art (video)
• Video
By Jason Larkin
Watch SEI researcher Dr. Jason Larkin discuss research to predict when (or whether) quantum computing will be mission-capable for hard combinatorial optimization problems in software verification and validation (V&V).
WatchCMMC—Securing the DIB Supply Chain with the Cybersecurity Maturity Model Certification Process 1.0 (CMMC 1.0)
• Fact Sheet
By Software Engineering Institute
This document explains the concept of process maturity, how it applies to cybersecurity, and the steps an organization can take to navigate the five CMMC levels of process maturity.
Learn MoreThe DoD’s Cybersecurity Maturity Model Certification and Process Maturity 1.0 (CMMC 1.0)
• Webcast
By Katie C. Stewart, Andrew F. Hoover
This webcast provides insight into how organizations can prepare for CMMC.
WatchHitting the Ground Running: Reviewing the 17 CMMC Level 1.O Practices (CMMC 1.0)
• Webcast
By Matthew Trevors, Gavin Jurecko
In this webcast, CMMC Architects, Gavin Jurecko, and Matt Trevors provide insight on how to evaluate and assess your organization's readiness for meeting the practice requirements of CMMC Level 1.
WatchArchitecture Analysis & Design Language (AADL): SEI Resources
• Collection
By Software Engineering Institute
This page collects the SEI's resources on AADL, a modeling notation with semantics for representing the architecture of large-scale, software-intensive embedded systems.
Learn MoreIntegrated Safety and Security Engineering for Mission-Critical Systems
• Presentation
By Sam Procter
This presentation describes progress in research to develop software and processes that use a system's architecture to support developer intuition and improve safety and security.
Learn MoreIntegrating Safety and Security Engineering for Mission-Critical Systems (2019)
• Poster
By Sam Procter
This poster provides an update on research to make systems safer and more secure.
DownloadIntegrating Safety and Security Engineering for Mission-Critical Systems
• Video
By Sam Procter, Alex Boydston (U.S. Army ADD/JMR)
Watch SEI principal investigator Dr. Sam Procter discuss ongoing research to make it easier to specify, design, and assure critical systems that are safer and more secure using model based …
WatchArchitectural Technical Debt Library
• Collection
By Software Engineering Institute
Delivering increasingly complex software-reliant systems demands better ways to manage the long-term effects of short-term expedients known as technical debt.
Learn MoreManaging Technical Debt: Reducing Friction in Software Development
• Book
By Philippe Kruchten, Robert Nord, Ipek Ozkaya
This book is for every software professional who wants to accelerate innovation in existing systems or build new systems that will be easier to maintain and evolve.
ReadCMMC Scoring Fact Sheet 1.0 (CMMC 1.0)
• Fact Sheet
By Software Engineering Institute
This document explains the concept of CMMC assessment level scoring.
Learn MoreCMMC Levels 1-3: Going Beyond NIST SP-171
• Podcast
By Katie C. Stewart, Andrew F. Hoover
Andrew Hoover and Katie Stewart, CMMC architects, discuss Levels 1-3 of the model and what steps organizations need to take to move beyond NIST 800-171.
Listen