CMU SEI 2017 Research Review
• Collection
Publisher
Software Engineering Institute
Abstract
This collection of presentations and posters and other material from our 2017 Research Review exemplifies the way we value our applied research and development (AR&D) in software and cybersecurity according to its impact on capability of the U.S. Department of Defense (DoD) to continually and rapidly develop and deploy innovative, software-enabled components and systems that are affordable, resilient, and easy to modify. We focus our AR&D on data-driven, formally verified, and automated development support across the system lifecycle. We produce algorithms, tools, techniques, and practices that address critical technology gaps. Further, we deliver capabilities through an execution model that combines our AR&D with customer engagement and our deep expertise in forming, applying, and transitioning solutions that improve the state of the practice in software engineering and cybersecurity.
Collection Items

CMU SEI 2017 Research Review Summaries
• Annual Report
By Software Engineering Institute
Short descriptions for FY2017 DoD-funded research projects.
Read
Automated Assurance of Security Policy Enforcement (2017)
• Poster
By Peter H. Feiler, Sam Procter
Poster for a research project on safety-critical system security policy enforcement
Download
Automated Assurance of Security Policy Enforcement (2017)
• Presentation
By Peter H. Feiler, Sam Procter
Presentation on research to detect vulnerabilities early in the lifecycle in architecture models
Learn More
FAA-Sponsored Research on Complexity and Safety
• Video
By Software Engineering Institute
Watch SEI Researcher, Sarah Sheard, discuss "FAA-Sponsored Research on Complexity and Safety".
Watch
Guided Architecture Trade Space Exploration of Safety Critical Software Systems
• Poster
By Sam Procter
This poster provides the results from research into tools to evaluate trade space for embedded systems.
Download
Guided Architecture Trade Space Exploration for Safety-Critical Software Systems
• Presentation
By Sam Procter
Presentation on research to create new tool prototype that automatically explores a system's trade space
Learn More
Inference of Memory Bounds
• Presentation
By William Klieber
Presentation on research to develop an algorithm to automatically infer the bounds of memory regions
Learn More
Inference of Memory Bounds
• Poster
By William Klieber
Poster on research to develop an algorithm to automatically infer the bounds of memory regions
Download
A Game-Theoretic Approach to Optimizing Behaviors in Acquisition
• Presentation
By William E. Novak
This presentation discusses research on using game theory in acquisition.
Learn More
Getting Contractors to Cooperate
• Poster
By William E. Novak
A poster describing work on a project entitled A Game-Theoretic Approach to Optimizing Acquisition Behaviors
Download
Authentication and Authorization for Internet of Things (IoT) Devices in Edge Environments
• Presentation
By Grace Lewis
Presentation on research to assure use of IoT devices in edge computing environments
Learn More
Two Perspectives on IoT Security
• Poster
By Grace Lewis
Poster illustrating the project "Authentication and Authorization for IoT Devices in Edge Environments."
Download
Automated Code Generation for High-Performance, Future-Compatible Graph Libraries
• Poster
By Scott McMillan
This SEI poster created for the 2017 Research Review illustrates research into graph analytics.
Download
Automated Code Generation for High-Performance Graph Libraries
• Presentation
By Scott McMillan
This FY2017 project builds on prior Line-funded research in the Patterns and Practices for Future Architectures.
Learn More
What will the Robot do Next?
• Poster
By Jonathan Chu
Poster on research to develop algorithms for robots to explain their behaviors and adapt their behavior to enable users to accurately predict their actions
Download
What will the Robot do Next?
• Presentation
By Jonathan Chu
Presentation on research to build algorithms that allow robots to explain their behaviors to users and adapt their behavior during execution to enable users to accurately predict what they will …
Learn More
Why Does Software Cost So Much? Towards a Causal Model
• Poster
By Robert W. Stoddard, Michael D. Konrad
Poster on research to build an actionable, full causal model of software cost factors
Download
Why Does Software Cost So Much? Towards a Causal Model
• Presentation
By Robert W. Stoddard, Michael D. Konrad
Presentation on research to build an actionable, full causal model of software cost factors that is immediately useful to DoD programs and contract negotiators
Learn More
Micro-Expressions: More than Meets the Eye
• Presentation
By Satya Venneti, Oren Wright
Presentation on research to build an accurate, automatic micro-expression analysis prototype that outperforms humans in spotting and recognizing facial micro-expressions in near real time
Learn More
Micro-Expressions: More than Meets the Eye
• Poster
By Satya Venneti, Oren Wright
Poster on research to build an accurate, automatic micro-expression analysis prototype that outperforms humans in spotting and recognizing facial micro-expressions in near real time
Download
Technical Detection of Intended Violence Against Self or Others
• Poster
By Tracy Cassidy
Poster on research into determining the extent to which it is possible to technically detect indicators of employees who may be on a path to harm themselves and/or others within …
Download
Technical Detection of Intended Violence against Self or Others
• Presentation
By Tracy Cassidy
Presentation on research to use insider threat tools to detect indicators of employees who are may be on a path to harm themselves and/or others within the workplace
Learn More
Technical Debt Analysis through Software Analytics
• Presentation
By Ipek Ozkaya
Presentation on research to develop tools that pinpoint problematic design decisions and quantify their consequences for uncovering technical debt
Learn More
Technical Debt Analysis through Software Analytics
• Poster
By Ipek Ozkaya
Poster on research to develop tools that integrate data from multiple, commonly available sources to pinpoint problematic design decisions and quantify their consequences in a repeatable and reliable way
Download
Certifiable Distributed Runtime Assurance
• Poster
By Dionisio de Niz
Poster on research into the use of enforcers for runtime assurance of distributed systems
Download
Certifiable Distributed Runtime Assurance
• Presentation
By Dionisio de Niz
Presentation on research on the use of enforcers for runtime assurance in distributed systems
Learn More
Rapid Expansion of Classification Models to Prioritize Static Analysis Alerts for C
• Presentation
By Lori Flynn
Presentation on research a method to automatically classify and prioritize alerts that minimizes manual effort to address the large volume of alerts
Learn More
Rapid Expansion of Classification Models to Prioritize Static Analysis Alerts for C
• Poster
By Lori Flynn
Poster on research to create a method to automatically classify and prioritize alerts.
Download
Cyber Affordance Visualization in Augmented Reality
• Poster
By Josh Hammerstein, Jeff Mattson
Poster on research to integrate cyber effects into tactical decision-making for soldiers
Download
Cyber Affordance Visualization in Augmented Reality
• Presentation
By Josh Hammerstein, Jeff Mattson
Presentation on research to integrate cyber effects into tactical decision-making for soldiers
Learn More
Obsidian - A Safer Blockchain Programming Language
• Presentation
By Eliezer Kanal, Michael Coblenz (Carnegie Mellon School of Computer Science)
Presentation on research by CMU and SEI to develop a novel programming language for secure blockchain software development
Learn More
Obsidian - A Safer Blockchain Programming Language
• Poster
By Eliezer Kanal, Michael Coblenz (Carnegie Mellon School of Computer Science)
Poster on research by CMU and SEI to create a novel programming language for safer blockchain software development
Download
Dynamic Design Analysis
• Poster
By Rick Kazman
Poster on research into dynamic dependencies that arise from the way modern systems are composed
Download
Dynamic Design Analysis
• Presentation
By Rick Kazman
Presentation on research to identify dynamic dependencies that result from the way modern systems are composed
Learn More
Measuring Performance of Big Learning Workloads
• Presentation
By Scott McMillan
Presentation on research to build a performance measurement workbench with tools to measure and report performance of large-scale ML platforms
Learn More
Measuring Performance of Big Learning Workloads
• Poster
By Scott McMillan
Poster on research to build a performance measurement workbench with tools to measure and report performance of large-scale ML platforms
Download
Events, Relationships, and Script Learning for Situational Awareness
• Poster
By Edwin J. Morris
Poster for research into using machine learning to extract patterns from high volumes of textual data
Download
Events, Relationships, and Script Learning for Situational Awareness
• Presentation
By Edwin J. Morris
Presentation on research to use machine learning to extract patterns from high volumes of textual data
Learn More
Foundations for Summarizing and Learning Latent Structure in Video
• Poster
By Kevin A. Pitstick
Poster on use of machine learning to develop automated and semantically meaningful video summarization
Download
Foundations for Summarizing and Learning Latent Structure in Video
• Presentation
By Kevin A. Pitstick
Presentation on using machine learning to develop automated and semantically meaningful video summarization
Learn More