CMU SEI 2017 Research Review
• Collection
Publisher
Software Engineering Institute
Abstract
This collection of presentations and posters and other material from our 2017 Research Review exemplifies the way we value our applied research and development (AR&D) in software and cybersecurity according to its impact on capability of the U.S. Department of Defense (DoD) to continually and rapidly develop and deploy innovative, software-enabled components and systems that are affordable, resilient, and easy to modify. We focus our AR&D on data-driven, formally verified, and automated development support across the system lifecycle. We produce algorithms, tools, techniques, and practices that address critical technology gaps. Further, we deliver capabilities through an execution model that combines our AR&D with customer engagement and our deep expertise in forming, applying, and transitioning solutions that improve the state of the practice in software engineering and cybersecurity.
Collection Items
CMU SEI 2017 Research Review Summaries
• Annual Report
By Software Engineering Institute
Short descriptions for FY2017 DoD-funded research projects.
ReadAutomated Assurance of Security Policy Enforcement (2017)
• Poster
By Peter H. Feiler, Sam Procter
Poster for a research project on safety-critical system security policy enforcement
DownloadAutomated Assurance of Security Policy Enforcement (2017)
• Presentation
By Peter H. Feiler, Sam Procter
Presentation on research to detect vulnerabilities early in the lifecycle in architecture models
Learn MoreFAA-Sponsored Research on Complexity and Safety
• Video
By Software Engineering Institute
Watch SEI Researcher, Sarah Sheard, discuss "FAA-Sponsored Research on Complexity and Safety".
WatchGuided Architecture Trade Space Exploration of Safety Critical Software Systems
• Poster
By Sam Procter
This poster provides the results from research into tools to evaluate trade space for embedded systems.
DownloadGuided Architecture Trade Space Exploration for Safety-Critical Software Systems
• Presentation
By Sam Procter
Presentation on research to create new tool prototype that automatically explores a system's trade space
Learn MoreInference of Memory Bounds
• Presentation
By William Klieber
Presentation on research to develop an algorithm to automatically infer the bounds of memory regions
Learn MoreInference of Memory Bounds
• Poster
By William Klieber
Poster on research to develop an algorithm to automatically infer the bounds of memory regions
DownloadA Game-Theoretic Approach to Optimizing Behaviors in Acquisition
• Presentation
By William E. Novak
This presentation discusses research on using game theory in acquisition.
Learn MoreGetting Contractors to Cooperate
• Poster
By William E. Novak
A poster describing work on a project entitled A Game-Theoretic Approach to Optimizing Acquisition Behaviors
DownloadAuthentication and Authorization for Internet of Things (IoT) Devices in Edge Environments
• Presentation
By Grace Lewis
Presentation on research to assure use of IoT devices in edge computing environments
Learn MoreTwo Perspectives on IoT Security
• Poster
By Grace Lewis
Poster illustrating the project "Authentication and Authorization for IoT Devices in Edge Environments."
DownloadAutomated Code Generation for High-Performance, Future-Compatible Graph Libraries
• Poster
By Scott McMillan
This SEI poster created for the 2017 Research Review illustrates research into graph analytics.
DownloadAutomated Code Generation for High-Performance Graph Libraries
• Presentation
By Scott McMillan
This FY2017 project builds on prior Line-funded research in the Patterns and Practices for Future Architectures.
Learn MoreWhat will the Robot do Next?
• Poster
By Jonathan Chu
Poster on research to develop algorithms for robots to explain their behaviors and adapt their behavior to enable users to accurately predict their actions
DownloadWhat will the Robot do Next?
• Presentation
By Jonathan Chu
Presentation on research to build algorithms that allow robots to explain their behaviors to users and adapt their behavior during execution to enable users to accurately predict what they will …
Learn MoreWhy Does Software Cost So Much? Towards a Causal Model
• Poster
By Robert W. Stoddard, Michael D. Konrad
Poster on research to build an actionable, full causal model of software cost factors
DownloadWhy Does Software Cost So Much? Towards a Causal Model
• Presentation
By Robert W. Stoddard, Michael D. Konrad
Presentation on research to build an actionable, full causal model of software cost factors that is immediately useful to DoD programs and contract negotiators
Learn MoreMicro-Expressions: More than Meets the Eye
• Presentation
By Satya Venneti, Oren Wright
Presentation on research to build an accurate, automatic micro-expression analysis prototype that outperforms humans in spotting and recognizing facial micro-expressions in near real time
Learn MoreMicro-Expressions: More than Meets the Eye
• Poster
By Satya Venneti, Oren Wright
Poster on research to build an accurate, automatic micro-expression analysis prototype that outperforms humans in spotting and recognizing facial micro-expressions in near real time
DownloadTechnical Detection of Intended Violence Against Self or Others
• Poster
By Tracy Cassidy
Poster on research into determining the extent to which it is possible to technically detect indicators of employees who may be on a path to harm themselves and/or others within …
DownloadTechnical Detection of Intended Violence against Self or Others
• Presentation
By Tracy Cassidy
Presentation on research to use insider threat tools to detect indicators of employees who are may be on a path to harm themselves and/or others within the workplace
Learn MoreTechnical Debt Analysis through Software Analytics
• Presentation
By Ipek Ozkaya
Presentation on research to develop tools that pinpoint problematic design decisions and quantify their consequences for uncovering technical debt
Learn MoreTechnical Debt Analysis through Software Analytics
• Poster
By Ipek Ozkaya
Poster on research to develop tools that integrate data from multiple, commonly available sources to pinpoint problematic design decisions and quantify their consequences in a repeatable and reliable way
DownloadCertifiable Distributed Runtime Assurance
• Poster
By Dionisio de Niz
Poster on research into the use of enforcers for runtime assurance of distributed systems
DownloadCertifiable Distributed Runtime Assurance
• Presentation
By Dionisio de Niz
Presentation on research on the use of enforcers for runtime assurance in distributed systems
Learn MoreRapid Expansion of Classification Models to Prioritize Static Analysis Alerts for C
• Presentation
By Lori Flynn
Presentation on research a method to automatically classify and prioritize alerts that minimizes manual effort to address the large volume of alerts
Learn MoreRapid Expansion of Classification Models to Prioritize Static Analysis Alerts for C
• Poster
By Lori Flynn
Poster on research to create a method to automatically classify and prioritize alerts.
DownloadCyber Affordance Visualization in Augmented Reality
• Poster
By Josh Hammerstein, Jeff Mattson
Poster on research to integrate cyber effects into tactical decision-making for soldiers
DownloadCyber Affordance Visualization in Augmented Reality
• Presentation
By Josh Hammerstein, Jeff Mattson
Presentation on research to integrate cyber effects into tactical decision-making for soldiers
Learn MoreObsidian - A Safer Blockchain Programming Language
• Presentation
By Eliezer Kanal, Michael Coblenz (Carnegie Mellon School of Computer Science)
Presentation on research by CMU and SEI to develop a novel programming language for secure blockchain software development
Learn MoreObsidian - A Safer Blockchain Programming Language
• Poster
By Eliezer Kanal, Michael Coblenz (Carnegie Mellon School of Computer Science)
Poster on research by CMU and SEI to create a novel programming language for safer blockchain software development
DownloadDynamic Design Analysis
• Poster
By Rick Kazman
Poster on research into dynamic dependencies that arise from the way modern systems are composed
DownloadDynamic Design Analysis
• Presentation
By Rick Kazman
Presentation on research to identify dynamic dependencies that result from the way modern systems are composed
Learn MoreMeasuring Performance of Big Learning Workloads
• Presentation
By Scott McMillan
Presentation on research to build a performance measurement workbench with tools to measure and report performance of large-scale ML platforms
Learn MoreMeasuring Performance of Big Learning Workloads
• Poster
By Scott McMillan
Poster on research to build a performance measurement workbench with tools to measure and report performance of large-scale ML platforms
DownloadEvents, Relationships, and Script Learning for Situational Awareness
• Poster
By Edwin J. Morris
Poster for research into using machine learning to extract patterns from high volumes of textual data
DownloadEvents, Relationships, and Script Learning for Situational Awareness
• Presentation
By Edwin J. Morris
Presentation on research to use machine learning to extract patterns from high volumes of textual data
Learn MoreFoundations for Summarizing and Learning Latent Structure in Video
• Poster
By Kevin A. Pitstick
Poster on use of machine learning to develop automated and semantically meaningful video summarization
DownloadFoundations for Summarizing and Learning Latent Structure in Video
• Presentation
By Kevin A. Pitstick
Presentation on using machine learning to develop automated and semantically meaningful video summarization
Learn More