CMU SEI 2018 Research Review
• Collection
Publisher
Software Engineering Institute
Topic or Tag
Abstract
This collection of presentations and posters and other material from our Research Review demonstrates our DoD-funded research in the following areas: risk reduction for rapid, affordable software development; creating operational resilience; making the recently possible mission practical; and automating test and evaluation. Among the presentations in the event were brief discussions called "lightning talks"; those short talks are included in this collection.
Collection Items
Automated Code Repair
• Video
By Software Engineering Institute
Static analysis can help find bugs, but the number of alerts can be overwhelming. Many bugs have a typical repair pattern, laying the foundation for automated code repair techniques.
WatchAutomated Code Generation for Future-Compatible High-Performance Graph Libraries
• Video
By Software Engineering Institute
Watch researchers, Scott McMillan and Franz Franchetti, discuss "Continuous Iterative Development and Deployment Practices".
WatchAssuring Non-Deterministic Software-Based Systems
• Presentation
By Dionisio de Niz
This Research Review 2018 presentation discusses explainable AI and runtime assurance enforcer research.
Learn MoreCausal Learning & Discovery
• Video
By Software Engineering Institute
Watch CMU Researchers David Danks and Robert Stoddard discuss the challenges of causal learning.
WatchOperational Cyber Risk Reduction
• Presentation
By April Galyardt, Josh Hammerstein
Reducing risk so that the U.S. Government and DoD can field and operate systems to support missions, even in the face of a capable adversary.
Learn MoreModern Software Lifecycle Practices
• Presentation
By Ipek Ozkaya, Sam Procter
Discussion of FY18 DoD Line-funded research into technical debt and security engineering.
Learn MorePanel Session: Applying Artificial Intelligence
• Video
By Software Engineering Institute
Watch the Research Review 2018 Applying Artificial Intelligence Panel Session.
WatchPanel Session: Rapid Velocity Software Development for Mature Organizations
• Video
By Software Engineering Institute
This panel session discusses the changes that speed makes and the decisions that need to be considered differently because of the ability to accomplish goals faster.
WatchScaling Software Testing and Evaluation
• Presentation
By Lori Flynn
Discussion of FY18 CMU SEI research in test and evaluation.
Learn MoreContinuous Iterative Development and Deployment Practices
• Presentation
By Eileen Wrubel, Hasan Yasar
Discussion of Agile and DevOps approaches at the SEI Research Review 2018.
Learn MoreSoftware for Mission
• Presentation
By Kevin A. Pitstick, Oren Wright
Discussion of DoD Line-funded research into video summarization and biometric algorithms
Learn MoreCapitalizing on Cloud Technologies
• Presentation
By Dale Alleshouse
Dale Alleshouse discusses how the DoD can capitalize on cloud technologies.
Learn MoreYou Can Prove It With Less: Data Science Tasks Using Challenge-Based Acquisition
• Presentation
By Ritwik Gupta
Ritwik Gupta discusses the ARPA functional map of the world and XV challenges.
Learn MoreExplainable AI and Human Computer Interaction
• Presentation
By April Galyardt
Watch Dr. April Galyardt discuss implications for explainable AI at the 2018 Research Review.
Learn MoreMission-Capable Quantum Computing for Software Verification and Validation
• Presentation
By Jason Larkin
Dr. Larkin discusses how Software VV is important and difficult for the DoD to implement.
Learn MoreHow Human-Centered Design can help create DoD Capability
• Presentation
By Barbora Batokova
Two brief lighting talks about human-centered design in DoD technology.
Learn MoreProject Summaries and Posters: 2018 Research Review
• Annual Report
By Software Engineering Institute
This booklet contains descriptions of CMU SEI research projects and images of related posters.
ReadBuilding Knowledge from Inference: Logical Language Models for Cybersecurity
• Presentation
By Lena Pons
Two lightning talks about cybersecurity and cloud computing.
Learn MoreLeveraging Emerging Changes in Computing
• Presentation
By Grace Lewis
This presentation was delivered by Grace Lewis at the SEI Research Review 2018.
Learn MoreA Novel Approach to Emotion Recognition from Voice
• Poster
By Oren Wright
This poster describes work toward a new emotional speech database and a set of techniques that can capture finer nuances than the current state of the art.
DownloadAutomatically Understanding Executables
• Poster
By Cory Cohen
This poster describes research aimed at reducing the cost of manual executable analysis for vulnerability discovery and malware analysis.
DownloadCausal Models for Software Cost Control (SCOPE)
• Poster
By Michael D. Konrad
This poster describes work in applying causal learning to program datasets to better understand which factors can reduce costs.
DownloadAutomatic Code Generation for Graph Algorithms
• Poster
By Scott McMillan, Franz Franchetti (Carnegie Mellon University)
This poster describes automated code generation of high-performance libraries of graph algorithms, tuned for different hardware architectures.
DownloadAutomated Code Repair to Ensure Memory Safety (2018)
• Poster
By William Klieber
This poster describes a technique for automatically repairing potential violations of memory safety so that the program is provably memory-safe.
DownloadBuilding a COTS Benchmark Baseline for Graph Analytics
• Poster
By Scott McMillan
This poster describes research aimed at building a benchmark baseline based on commercial off-the-shelf (COTS) field-programmable gate array (FPGA) hardware.
DownloadCertifiable Distributed Runtime Assurance
• Poster
By Dionisio de Niz
This poster describes the use of enforcers to assure the safety of distributed cyber-physical systems.
DownloadHigh Assurance Software-Defined IoT Security
• Poster
By Grace Lewis
This poster describes a solution for the secure use of IoT devices in the DoD by moving part of the security enforcement to the network.
DownloadInfrastructure as Code
• Poster
By John Klein
This poster describes an approach and tools for recovering a deployed system's technical baseline.
DownloadIntegrated Safety and Security Engineering for Mission Critical Systems (2018)
• Poster
By Peter H. Feiler, Sam Procter
This poster describes progress in the first year of a three-year project aimed at understanding interactions between safety and security.
DownloadModeling and Explaining Sequential Behavior
• Poster
By Software Engineering Institute
This poster describes two research projects that offer novel solutions toward modeling and explaining sequential behavior.
DownloadModeling the Operations of the Vulnerability Ecosystem
• Poster
By Allen D. Householder
This poster describes models, metrics, datasets, and key performance indicators developed to improve vulnerability response.
DownloadPredicting Security Flaws through Architectural Flaws
• Poster
By Robert Schiela, Rick Kazman
This poster describes efforts toward using automated architecture analysis to identify, prevent, and mitigate security flaws in code.
DownloadRapid Construction of Accurate Automatic Alert Handling
• Poster
By Lori Flynn
This poster describes the development of an extensible architecture for the classification and advanced prioritization of flaws in code.
DownloadRapid Software Composition by Assessing Untrusted Components
• Poster
By Rick Kazman
This poster describes efforts to increase the speed and confidence of the component selection process in software systems.
DownloadSummarizing and Searching Video
• Poster
By Edwin J. Morris, Kevin A. Pitstick
This poster describes algorithms and a prototype developed to help analysts process information from video streams.
DownloadData-Driven Technical Debt Analysis
• Poster
By Ipek Ozkaya, Robert Nord
This poster describes research efforts in analyzing data to uncover technical debt.
DownloadTiming Verification of Undocumented Multicore
• Poster
By Bjorn Andersson
This poster describes an abstraction and corresponding analysis that allow timing verification of undocumented hardware.
DownloadTowards Security Defect Prediction with AI
• Poster
By Nathan M. VanHoudnos
This poster describes research comparing a state-of-the-art AI system to existing static analysis approaches for defect prediction.
Download