CMU SEI 2018 Research Review
• Collection
Publisher
Software Engineering Institute
Topic or Tag
Abstract
This collection of presentations and posters and other material from our Research Review demonstrates our DoD-funded research in the following areas: risk reduction for rapid, affordable software development; creating operational resilience; making the recently possible mission practical; and automating test and evaluation. Among the presentations in the event were brief discussions called "lightning talks"; those short talks are included in this collection.
Collection Items
![video-thumbnail-1](/media/images/Video_Thumbnail_1.max-150x150.format-webp.webp)
Automated Program Repair
• Video
By Software Engineering Institute
Watch Researchers, Will Klieber and Claire Le Goues, discuss "Automated Program Repair".
Watch![video-thumbnail-2](/media/images/Video_Thumbnail_2.max-150x150.format-webp.webp)
Automated Code Generation for Future-Compatible High-Performance Graph Libraries
• Video
By Software Engineering Institute
Watch researchers, Scott McMillan and Franz Franchetti, discuss "Continuous Iterative Development and Deployment Practices".
Watch![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Assuring Non-Deterministic Software-Based Systems
• Presentation
By Dionisio de Niz
Research Review 2018 presentation on explainable AI and runtime assurance enforcer research.
Learn More![video-thumbnail-3](/media/images/Video_Thumbnail_3.max-150x150.format-webp.webp)
Causal Learning & Discovery
• Video
By Software Engineering Institute
Watch CMU Researchers, David Danks and Robert Stoddard, discuss "Causal Learning & Discovery"
Watch![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Operational Cyber Risk Reduction
• Presentation
By April Galyardt, Josh Hammerstein
Reducing risk so that the U.S. Government and DoD can field and operate systems to support missions, even in the face of a capable adversary.
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Modern Software Lifecycle Practices
• Presentation
By Ipek Ozkaya, Sam Procter
Discussion of FY18 DoD Line-funded research into technical debt and security engineering.
Learn More![video-thumbnail-4](/media/images/Video_Thumbnail_4.max-150x150.format-webp.webp)
Panel Session: Applying Artificial Intelligence
• Video
By Software Engineering Institute
Watch the Research Review 2018 Applying Artificial Intelligence Panel Session.
Watch![video-thumbnail-5](/media/images/Video_Thumbnail_5.max-150x150.format-webp.webp)
Panel Session: Rapid Velocity Software Development for Mature Organizations
• Video
By Software Engineering Institute
Panel Session: Rapid Velocity Software Development for Mature Organizations
Watch![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Scaling Software Testing and Evaluation
• Presentation
By Lori Flynn
Discussion of FY18 CMU SEI research in test and evaluation.
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Continuous Iterative Development and Deployment Practices
• Presentation
By Eileen Wrubel, Hasan Yasar
Discussion of Agile and DevOps approaches at the SEI Research Review 2018.
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Software for Mission
• Presentation
By Kevin A. Pitstick, Oren Wright
Discussion of DoD Line-funded research into video summarization and biometric algorithms
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Capitalizing on Cloud Technologies
• Presentation
By Dale Alleshouse
Dale Alleshouse discusses how the DoD can capitalize on cloud technologies.
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
You Can Prove It With Less: Data Science Tasks Using Challenge-Based Acquisition
• Presentation
By Ritwik Gupta
Ritwik Gupta discusses the ARPA functional map of the world and XV challenges.
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Explainable AI and Human Computer Interaction
• Presentation
By April Galyardt
Dr. April Galyardt presents "Explainable AI and Human Computer Interaction" at the SEI Research Review 2018.
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Mission-Capable Quantum Computing for Software Verification and Validation
• Presentation
By Jason Larkin
Dr. Larkin discusses how Software VV is important and difficult for the DoD to implement.
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
How Human-Centered Design can help create DoD Capability
• Presentation
By Barbora Batokova
Two brief lighting talks about human-centered design in DoD technology.
Learn More![generic-asset-thumbnail-1](/media/images/Generic_Asset_Thumbnail_1.max-150x150.format-webp.webp)
Project Summaries and Posters: 2018 Research Review
• Annual Report
By Software Engineering Institute
This booklet contains descriptions of CMU SEI research projects and images of related posters.
Read![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Building Knowledge from Inference: Logical Language Models for Cybersecurity
• Presentation
By Lena Pons
Two lightning talks about cybersecurity and cloud computing.
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Leveraging Emerging Changes in Computing
• Presentation
By Grace Lewis
This presentation was delivered by Grace Lewis at the SEI Research Review 2018.
Learn More![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
A Novel Approach to Emotion Recognition from Voice
• Poster
By Oren Wright
This poster describes work toward a new emotional speech database and a set of techniques that can capture finer nuances than the current state of the art.
Download![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Automatically Understanding Executables
• Poster
By Cory Cohen
This poster describes research aimed at reducing the cost of manual executable analysis for vulnerability discovery and malware analysis.
Download![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Causal Models for Software Cost Control (SCOPE)
• Poster
By Michael D. Konrad
This poster describes work in applying causal learning to program datasets to better understand which factors can reduce costs.
Download![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Automatic Code Generation for Graph Algorithms
• Poster
By Scott McMillan, Franz Franchetti (Carnegie Mellon University)
This poster describes automated code generation of high-performance libraries of graph algorithms, tuned for different hardware architectures.
Download![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Automated Code Repair to Ensure Memory Safety (2018)
• Poster
By William Klieber
This poster describes a technique for automatically repairing potential violations of memory safety so that the program is provably memory-safe.
Download![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Building a COTS Benchmark Baseline for Graph Analytics
• Poster
By Scott McMillan
This poster describes research aimed at building a benchmark baseline based on commercial off-the-shelf (COTS) field-programmable gate array (FPGA) hardware.
Download![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Certifiable Distributed Runtime Assurance
• Poster
By Dionisio de Niz
This poster describes the use of enforcers to assure the safety of distributed cyber-physical systems.
Download![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
High Assurance Software-Defined IoT Security
• Poster
By Grace Lewis
This poster describes a solution for the secure use of IoT devices in the DoD by moving part of the security enforcement to the network.
Download![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Infrastructure as Code
• Poster
By John Klein
This poster describes an approach and tools for recovering a deployed system's technical baseline.
Download![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Integrated Safety and Security Engineering for Mission Critical Systems (2018)
• Poster
By Peter H. Feiler, Sam Procter
This poster describes progress in the first year of a three-year project aimed at understanding interactions between safety and security.
Download![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Modeling and Explaining Sequential Behavior
• Poster
By Software Engineering Institute
This poster describes two research projects that offer novel solutions toward modeling and explaining sequential behavior.
Download![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Modeling the Operations of the Vulnerability Ecosystem
• Poster
By Allen D. Householder
This poster describes models, metrics, datasets, and key performance indicators developed to improve vulnerability response.
Download![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Predicting Security Flaws through Architectural Flaws
• Poster
By Robert Schiela, Rick Kazman
This poster describes efforts toward using automated architecture analysis to identify, prevent, and mitigate security flaws in code.
Download![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Rapid Construction of Accurate Automatic Alert Handling
• Poster
By Lori Flynn
This poster describes the development of an extensible architecture for the classification and advanced prioritization of flaws in code.
Download![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Rapid Software Composition by Assessing Untrusted Components
• Poster
By Rick Kazman
This poster describes efforts to increase the speed and confidence of the component selection process in software systems.
Download![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Summarizing and Searching Video
• Poster
By Edwin J. Morris, Kevin A. Pitstick
This poster describes algorithms and a prototype developed to help analysts process information from video streams.
Download![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Data-Driven Technical Debt Analysis
• Poster
By Ipek Ozkaya, Robert Nord
This poster describes research efforts in analyzing data to uncover technical debt.
Download![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Timing Verification of Undocumented Multicore
• Poster
By Bjorn Andersson
This poster describes an abstraction and corresponding analysis that allow timing verification of undocumented hardware.
Download![poster-thumbnail-1](/media/images/Poster_Thumbnail_1.max-150x150.format-webp.webp)
Towards Security Defect Prediction with AI
• Poster
By Nathan M. VanHoudnos
This poster describes research comparing a state-of-the-art AI system to existing static analysis approaches for defect prediction.
Download