2019 SEI Year in Review Resources
• Collection
Publisher
Software Engineering Institute
Subjects
Abstract
Thank you for reading the 2019 SEI Year in Review. The following resources provide more information about the topics addressed in individual articles in the Year in Review. The Table of Contents presents the 2019 SEI Year in Review article titles followed by their related resources. The list of links at the bottom of the page provide author information and brief summaries for each item.
Go to the 2019 SEI Year in Review.
Table of Contents
SEI Team Wins 2019 ISLA Award
DoD Developer’s Guidebook for Software Assurance - Special Report
Program Manager's Guidebook for Software Assurance - Special Report
A Pivotal Moment: AI Engineering for Defense and National Security
AI Engineering: 11 Foundational Practices - White Paper
AI Engineering: 11 Foundational Practices for Decision Makers - SEI Blog
Defining AI Engineering - Video
AI Engineering - Web Page
Supporting AI Engineering Challenges in the DoD: Summarizing Aerial Surveillance Video
Summarizing and Searching Video: Patterns-of-Life Analysis - Poster
Summarizing and Searching Video: Geometry-Aware Visual Surveillance - Poster
Summarizing and Searching Video with Machine Learning - SEI Blog
Graph Convolutional Neural Networks to Bolster AI Analysis of Irregular Data
Graph Convolutional Neural Networks - Poster
Graph Convolutional Neural Networks - Presentation
SEI Collaborations Tackle Big-Data Analytics
Dynamic Parallelism for Simple and Efficient GPU Graph Algorithms - Conference Paper
Design and Implementation of the GraphBLAS Template Library (GBTL) - Presentation
Mathematical Foundations of the GraphBLAS - Conference Paper
Automated Code Generation for High-Performance Graph Libraries - Presentation
Spiral/AIML: Frontiers of Graph Processing in Linear Algebra - Poster
Spiral/AIML: Resource-Constrained Co-Optimization for High-Performance Data-Intensive Computing - Video
GraphBLAS Template Library (GBTL) - Software
Graph BLAS Forum - Web Page
SPIRAL Project Homepage - Web Page
Can We Trust Our Cyber-Physical Systems?
Cyber-Physical Systems - Book
Combining Symbolic Runtime Enforcers for Cyber-Physical Systems - Conference Paper
Have Your PI and Eat it Too: Practical Security on a Low-cost Ubiquitous Computing Platform - Conference Paper
Certifiable Distributed Runtime Assurance in Cyber-Physical Systems - SEI Blog
Design of Software Rejuvenation for CPS Security Using Invariant Sets - Conference Paper
Mixed-Trust Computing for Real-Time Systems - Conference Paper
uber eXtensible Micro-Hypervisor Framework - Software
Rapid Certifiable Trust - Presentation
Rapid Certifiable Trust - Poster
Rapid Certifiable Trust - Video
Building Damage Assessment Dataset Advances Machine Learning for Disaster Recovery
Creating xBD: A Dataset for Assessing Building Damage from Satellite Imagery - Academic Paper
xBD Dataset - Software
SEI to Transition AI Expertise to Humanitarian Assistance and Disaster Response Community - SEI News
AI in Humanitarian Assistance and Disaster Response - Podcast
SEI Researchers Help Design xView2 Machine Learning Competition - SEI News
The SEI Helps Shape Software Acquisition Policy Reform
Modernizing DoD Software Production - Presentation
Updated Pharos Binary Analysis Framework Speeds Malware Analysis
Pharos Binary Static Analysis Tools Released on GitHub - SEI Blog
Pharos - Software
Using Logic Programming to Recover C++ Classes and Methods from Compiled Executables - Article
Path Finding in Malicious Binaries: First in a Series - SEI Blog
Using OOAnalyzer to Reverse Engineer Object Oriented Code with Ghidra - SEI Blog
SEI’s CERT Division Releases New Version of Pharos Toolset - SEI News
SEI Report Reveals the State of U.S. Cyber Intelligence
Cyber Intelligence Tradecraft Report: The State of Cyber Intelligence Practices in the United States - Collection
Cyber Intelligence Report Outlines Best Practices and Biggest Challenges - Press Release
Cyber Intelligence: Best Practices and Biggest Challenges - Podcast
Bolstering Security with Cyber Intelligence - SEI Blog
Cyber Intelligence Study - Web Page
Cybersecurity Professionals Flex Their Muscles in SEI-Developed Competition
DevSecOps Takes DoD Software Development to the Next Level
The CERT DevSecOps Model: Building Secure Applications - Brochure
DevSecOps Implementation in the DoD: Barriers and Enablers - Webinar
DevSecOps Process and Implementation - Course
Building International Cybersecurity Capacity
CSIRT Resources - Collection
Cybersecurity Center Development - Web Page
Engaging the CSIRT Community: Cyber Capacity Building on a Global Scale - SEI Blog
Annual FIRST Conference on Computer Security Incident Handling - Web Page
NatCSIRT - Web Page
Predicting the Future of Quantum Computing
Verifying and Validating Mission-Critical Systems Using Quantum Computing - Web Page
Projecting Quantum Computational Advantage Versus Classical State of the Art - Presentation
Projecting Quantum Computational Advantage Versus Classical State of the Art - Video
Achieving the Quantum Advantage in Software - SEI Blog
Projecting NISQ-era quantum advantage with QAOA - Presentation
Maturity Model Certification to Improve Cybersecurity in the DoD Supply Chain
CMMC—Securing the DIB Supply Chain with the Cybersecurity Maturity Model Certification Process - Fact Sheet
An Introduction to the Cybersecurity Maturity Model Certification (CMMC) - SEI Blog
Cybersecurity Maturity Model Certification (CMMC) Part 2: Process Maturity's Role in Cybersecurity - SEI Blog
Beyond NIST SP 800-171: 20 Additional Practices in CMMC - SEI Blog
The DoD’s Cybersecurity Maturity Model Certification and Process Maturity - Webinar
CMMC Scoring Fact Sheet - Fact Sheet
Hitting the Ground Running: Reviewing the 17 CMMC Level 1 Practices - Webinar
Cybersecurity Maturity Model Certification - Web Page
AADL’s Research-to-Practice Pipeline Supports the Army Futures Command
Architecture Analysis & Design Language (AADL): SEI Resources - Collection
Architecture Analysis and Design Language - Web page
Integrated Safety and Security Engineering for Mission-Critical Systems - Presentation
Integrating Safety and Security Engineering for Mission-Critical Systems (2019) - Poster
Integrating Safety and Security Engineering for Mission-Critical Systems - Video
OSATE - Web Page
Subject: Architecture Analysis & Design Language (AADL) - SEI Blog Category
Managing Technical Debt for Modern Software Development
Managing Technical Debt with Data-Driven Analysis - Web Page
Architectural Technical Debt Library - Collection
Managing Technical Debt: Reducing Friction in Software Development - Book
Automatically Detecting Technical Debt Discussions with Machine Learning - SEI Blog
International Conference on Technical Debt TechDebt 2020 - Web Page
Subject: Technical Debt - SEI Blog Category
Collection Items

Graph Convolutional Neural Networks
• Presentation
By Oren Wright
This project used graph signal processing formalisms to create new deep learning tools for graph convolutional neural networks (GCNNs).
Learn More
Graph Convolutional Neural Networks
• Video
By Oren Wright
Watch SEI researcher Mr. Oren Wright discuss using graph signal processing formalisms to create new deep learning tools for graph convolutional neural networks (GCNNs) to answer the question "how does …
Watch
Dynamic Parallelism for Simple and Efficient GPU Graph Algorithms
• Conference Paper
By Peter Zhang (Indiana University), Eric Holk (Indiana University), John Matty, Samantha Misurda, Marcin Zalewski (Indiana University), Jonathan Chu, Scott McMillan, Andrew Lumsdaine (Indiana University)
Presented at the 2015 Supercomputing Conference, this paper shows that dynamic parallelism enables relatively high-performance graph algorithms for GPUs.
Read
Design and Implementation of the GraphBLAS Template Library (GBTL)
• Presentation
By Scott McMillan, Samantha Misurda, Marcin Zalewski (Indiana University), Peter Zhang (Indiana University), Andrew Lumsdaine (Indiana University)
The design of the GraphBLAS Template Library separates graph algorithm development from performance tuning for heterogeneous high-performance computing architectures.
Learn More
Automated Code Generation for High-Performance Graph Libraries
• Presentation
By Scott McMillan
Presentation on research into graph analytics
Learn More
Mathematical Foundations of the GraphBLAS
• Conference Paper
By Jeremy Kepner (MIT Lincoln Laboratory), Peter Aaltonen (Indiana University), David Bader (Georgia Institute of Technology), Aydın Buluç (Lawrence Berkeley National Laboratory), Franz Franchetti (Carnegie Mellon University), John Gilbert (University of California, Santa Barbara), Dylan Hutchison (University of Washington), Manoj Kumar (IBM), Andrew Lumsdaine (Indiana University), Henning Meyerhenke (Karlsruhe Institute of Technology), Scott McMillan, Jose Moreira (IBM), John D. Owens (University of California, Davis), Carl Yang (University of California, Davis), Marcin Zalewski (Indiana University), Tim Mattson (Intel)
This paper introduces the mathematics of the GraphBLAS, which is being developed to bring matrix-based graph algorithms to the broadest possible audience.
Read
Spiral/AIML: Frontiers of Graph Processing in Linear Algebra
• Poster
By Scott McMillan, Franz Franchetti (Carnegie Mellon University)
This poster represents research to extend the use of linear algebra beyond simple graph traversal.
Download
Spiral/AIML: Resource-Constrained Co-Optimization for High-Performance, Data-Intensive Computing
• Video
By Scott McMillan, Franz Franchetti (Carnegie Mellon University)
Watch SEI Principal Investigator, Dr. Scott McMillan, and research collaborator, CMU ECE Professor Franz Franchetti, discuss a community research effort to develop tools to reduce the prohibitive cost of implementing …
Watch
Cyber-Physical Systems
• Book
By Ragunathan (Raj) Rajkumar, Dionisio de Niz, Mark H. Klein
This book addresses Cyber-Physical Systems (CPS) challenges and innovations, it describes the foundations that underlie CPS, and offers guiding principles for all levels.
Read
Rapid Certifiable Trust
• Presentation
By Dionisio de Niz
Rapid Certifiable Trust preserves cyber-physical system safety by verifying and protecting part of a system and enforcing constraints on unverified components.
Learn More