2019 SEI Year in Review Resources
• Collection
Publisher
Software Engineering Institute
Subjects
Abstract
Thank you for reading the 2019 SEI Year in Review. The following resources provide more information about the topics addressed in individual articles in the Year in Review. The Table of Contents presents the 2019 SEI Year in Review article titles followed by their related resources. The list of links at the bottom of the page provide author information and brief summaries for each item.
Go to the 2019 SEI Year in Review.
Table of Contents
SEI Team Wins 2019 ISLA Award
DoD Developer’s Guidebook for Software Assurance - Special Report
Program Manager's Guidebook for Software Assurance - Special Report
A Pivotal Moment: AI Engineering for Defense and National Security
AI Engineering: 11 Foundational Practices - White Paper
AI Engineering: 11 Foundational Practices for Decision Makers - SEI Blog
Defining AI Engineering - Video
AI Engineering - Web Page
Supporting AI Engineering Challenges in the DoD: Summarizing Aerial Surveillance Video
Summarizing and Searching Video: Patterns-of-Life Analysis - Poster
Summarizing and Searching Video: Geometry-Aware Visual Surveillance - Poster
Summarizing and Searching Video with Machine Learning - SEI Blog
Graph Convolutional Neural Networks to Bolster AI Analysis of Irregular Data
Graph Convolutional Neural Networks - Poster
Graph Convolutional Neural Networks - Presentation
SEI Collaborations Tackle Big-Data Analytics
Dynamic Parallelism for Simple and Efficient GPU Graph Algorithms - Conference Paper
Design and Implementation of the GraphBLAS Template Library (GBTL) - Presentation
Mathematical Foundations of the GraphBLAS - Conference Paper
Automated Code Generation for High-Performance Graph Libraries - Presentation
Spiral/AIML: Frontiers of Graph Processing in Linear Algebra - Poster
Spiral/AIML: Resource-Constrained Co-Optimization for High-Performance Data-Intensive Computing - Video
GraphBLAS Template Library (GBTL) - Software
Graph BLAS Forum - Web Page
SPIRAL Project Homepage - Web Page
Can We Trust Our Cyber-Physical Systems?
Cyber-Physical Systems - Book
Combining Symbolic Runtime Enforcers for Cyber-Physical Systems - Conference Paper
Have Your PI and Eat it Too: Practical Security on a Low-cost Ubiquitous Computing Platform - Conference Paper
Certifiable Distributed Runtime Assurance in Cyber-Physical Systems - SEI Blog
Design of Software Rejuvenation for CPS Security Using Invariant Sets - Conference Paper
Mixed-Trust Computing for Real-Time Systems - Conference Paper
uber eXtensible Micro-Hypervisor Framework - Software
Rapid Certifiable Trust - Presentation
Rapid Certifiable Trust - Poster
Rapid Certifiable Trust - Video
Building Damage Assessment Dataset Advances Machine Learning for Disaster Recovery
Creating xBD: A Dataset for Assessing Building Damage from Satellite Imagery - Academic Paper
xBD Dataset - Software
SEI to Transition AI Expertise to Humanitarian Assistance and Disaster Response Community - SEI News
AI in Humanitarian Assistance and Disaster Response - Podcast
SEI Researchers Help Design xView2 Machine Learning Competition - SEI News
The SEI Helps Shape Software Acquisition Policy Reform
Modernizing DoD Software Production - Presentation
Updated Pharos Binary Analysis Framework Speeds Malware Analysis
Pharos Binary Static Analysis Tools Released on GitHub - SEI Blog
Pharos - Software
Using Logic Programming to Recover C++ Classes and Methods from Compiled Executables - Article
Path Finding in Malicious Binaries: First in a Series - SEI Blog
Using OOAnalyzer to Reverse Engineer Object Oriented Code with Ghidra - SEI Blog
SEI’s CERT Division Releases New Version of Pharos Toolset - SEI News
SEI Report Reveals the State of U.S. Cyber Intelligence
Cyber Intelligence Tradecraft Report: The State of Cyber Intelligence Practices in the United States - Collection
Cyber Intelligence Report Outlines Best Practices and Biggest Challenges - Press Release
Cyber Intelligence: Best Practices and Biggest Challenges - Podcast
Bolstering Security with Cyber Intelligence - SEI Blog
Cyber Intelligence Study - Web Page
Cybersecurity Professionals Flex Their Muscles in SEI-Developed Competition
DevSecOps Takes DoD Software Development to the Next Level
The CERT DevSecOps Model: Building Secure Applications - Brochure
DevSecOps Implementation in the DoD: Barriers and Enablers - Webinar
DevSecOps Process and Implementation - Course
Building International Cybersecurity Capacity
CSIRT Resources - Collection
Cybersecurity Center Development - Web Page
Engaging the CSIRT Community: Cyber Capacity Building on a Global Scale - SEI Blog
Annual FIRST Conference on Computer Security Incident Handling - Web Page
NatCSIRT - Web Page
Predicting the Future of Quantum Computing
Verifying and Validating Mission-Critical Systems Using Quantum Computing - Web Page
Projecting Quantum Computational Advantage Versus Classical State of the Art - Presentation
Projecting Quantum Computational Advantage Versus Classical State of the Art - Video
Achieving the Quantum Advantage in Software - SEI Blog
Projecting NISQ-era quantum advantage with QAOA - Presentation
Maturity Model Certification to Improve Cybersecurity in the DoD Supply Chain
CMMC—Securing the DIB Supply Chain with the Cybersecurity Maturity Model Certification Process - Fact Sheet
An Introduction to the Cybersecurity Maturity Model Certification (CMMC) - SEI Blog
Cybersecurity Maturity Model Certification (CMMC) Part 2: Process Maturity's Role in Cybersecurity - SEI Blog
Beyond NIST SP 800-171: 20 Additional Practices in CMMC - SEI Blog
The DoD’s Cybersecurity Maturity Model Certification and Process Maturity - Webinar
CMMC Scoring Fact Sheet - Fact Sheet
Hitting the Ground Running: Reviewing the 17 CMMC Level 1 Practices - Webinar
Cybersecurity Maturity Model Certification - Web Page
AADL’s Research-to-Practice Pipeline Supports the Army Futures Command
Architecture Analysis & Design Language (AADL): SEI Resources - Collection
Architecture Analysis and Design Language - Web page
Integrated Safety and Security Engineering for Mission-Critical Systems - Presentation
Integrating Safety and Security Engineering for Mission-Critical Systems (2019) - Poster
Integrating Safety and Security Engineering for Mission-Critical Systems - Video
OSATE - Web Page
Subject: Architecture Analysis & Design Language (AADL) - SEI Blog Category
Managing Technical Debt for Modern Software Development
Managing Technical Debt with Data-Driven Analysis - Web Page
Architectural Technical Debt Library - Collection
Managing Technical Debt: Reducing Friction in Software Development - Book
Automatically Detecting Technical Debt Discussions with Machine Learning - SEI Blog
International Conference on Technical Debt TechDebt 2020 - Web Page
Subject: Technical Debt - SEI Blog Category
Collection Items

Rapid Certifiable Trust
• Poster
By Dionisio de Niz
This poster describes investigation into formal methods to automatically validate new technologies for safety.
Download
Rapid Certifiable Trust (video)
• Video
By Dionisio de Niz
Watch SEI principal investigator Dr. Dionisio de Niz discuss research on verification techniques to reduce the deployment time of cyber-physical systems such as unmanned vehicles and aircraft, by reducing the …
Watch
AI in Humanitarian Assistance and Disaster Response
• Podcast
By Ritwik Gupta
Ritwik Gupta, a machine learning research scientist in the SEI's Emerging Technology Center, discusses the use of AI in humanitarian assistance and disaster response (HADR) efforts.
Listen
Modernizing DoD Software Production
• Presentation
By Jeff Boleng
This presentation discusses the progress being made by the Department of Defense (DoD) against the recommendations in the 2019 Defense Innovation Board's (DIB) study.
Learn More
Using Logic Programming to Recover C++ Classes and Methods from Compiled Executables
• Article
By Edward J. Schwartz, Cory Cohen, Michael Duggan, Jeff Gennari, Jeff Havrilla, Chuck Hines
This article describes OOAnalyzer, a system that statically recovers detailed C++ abstractions from executables in a scalable manner.
Read
Cyber Intelligence Tradecraft Report: The State of Cyber Intelligence Practices in the United States (Study Report and Implementation Guides)
• Collection
By Jared Ettinger, April Galyardt, Ritwik Gupta, Daniel DeCapria, Eliezer Kanal, Dan J. Klinedinst, Deana Shick, Samuel J. Perl, Geoffrey B. Dobson, Geoff Sanders, Daniel L. Costa, Larry Rogers, Hollen Barmer, Jennifer Kane, Heather Evans, Erica Brandon, Andrew O. Mellinger
This report details the findings of a study the SEI conducted at the request of the United States Office of the Director of National Intelligence. In the report, we present …
Learn More
Cyber Intelligence: Best Practices and Biggest Challenges
• Podcast
By Jared Ettinger
Jared Ettinger, a cyber intelligence researcher in the SEI's Emerging Technology Center, discusses the findings of a report that outlines challenges and best practices in cyber intelligence.
Listen
The CERT DevSecOps Model: Building Secure Applications
• Brochure
By Software Engineering Institute
DevOps is a modern software development approach where stakeholders and development and operations teams collaborate to improve efficiency and results.
Learn More
Build Secure Applications with DevSecOps
• Video
By Hasan Yasar
Watch Hasan Yasar discuss how to "Build Secure Applications with DevSecOps."
Watch