SEI 2016 Research Review
• Collection
Publisher
Software Engineering Institute
Abstract
Presentations and materials pertaining to the review of the SEI FY2016 research portfolio,
Collection Items
SEI Research Review 2016: Project Summaries and Posters
• Annual Report
By Software Engineering Institute
This booklet contains concise descriptions of SEI FY16 Line and LENS projects.
ReadAuto-Active Verification of Software with Timers and Clocks
• Presentation
By Sagar Chaki, Dionisio de Niz
Software that accesses the system clock is the key to real-time and cyber-physical systems
Learn MoreAutomated Assurance of Security Policy Enforcement
• Presentation
By Julien Delange
Security is not only a matter of code. This work extends the AADL with security design rules
Learn MoreAutomated Code Repair
• Poster
By William Klieber
Integer overflow in calculations related to array bounds or indices is almost always a bug
DownloadAutomated Code Repair
• Presentation
By William Klieber
This work aims to develop techniques to eliminate security vulnerabilities at a lower cost than manual repair.
Learn MoreThe Critical Role of Positive Incentives for Reducing Insider Threats
• Technical Report
By Andrew P. Moore, Samuel J. Perl, Jennifer Cowley, Matthew L. Collins, Tracy Cassidy, Nathan M. VanHoudnos, Palma Buttles-Valdez, Daniel Bauer, Allison Parshall, Jeff Savinda, Elizabeth A. Monaco, Jamie L. Moyes, Denise M. Rousseau (Carnegie Mellon University)
This report describes how positive incentives complement traditional practices to provide a better balance for organizations' insider threat programs.
ReadThe Critical Role of Positive Incentives in Reducing Insider Threat
• Presentation
By Andrew P. Moore
Investigated job engagement, perceived organizational support, and connectedness at work.
Learn MoreData Validation for Large-Scale Analytics
• Poster
By Stephanie Rosenthal
This poster detailing building tools to support data sampling and visualization was presented at the SEI Research Review 2016.
DownloadEnabling Evidence-Based Modernization
• Poster
By John Klein
This poster on Evidence-Based Modernization (EEBM) was presented at the SEI Research Review 2016.
DownloadEnabling Evidence Based Modernization
• Presentation
By John Klein
The goal of is work is to develop a lightweight method for representing alternatives.
Learn MoreEstablishing Coding Requirements for Non-Safety-Critical C++
• Poster
By Aaron Ballman
Establishing Coding Requirements for Non-Safety-Critical C++
DownloadEstablishing Coding Requirements for Non-Safety-Critical C++ Systems
• Presentation
By Aaron Ballman
Developed checkers, rules, and rule organization for secure C++ code.
Learn MoreEvaluation of Threat Modeling Methodologies
• Presentation
By Forrest Shull
The result of this work is a set of test principles that can help Programs select the most appropriate threat modeling methodologies.
Learn MoreEvaluation of Threat Modeling Methodologies
• Poster
By Forrest Shull
This poster illustrates test principles that can help Programs select the most appropriate threat modeling methodologies.
DownloadExperiences Developing an IBM Watson Cognitive Processing Application
• Presentation
By Mark Sherman
Inquiry into whether DoD could use IBM Watson to improve assurance
Learn MoreGeneralized Automated Cyber-Readiness Evaluation
• Presentation
By Rotem D. Guttman
Applies principles of train as you fight and evaluate as you fight to cyber workforce development.
Learn MoreGraphBLAS: A Programming Specification for Graph Analysis
• Presentation
By Scott McMillan
Describes work in graph analysis, an important and pervasive area for the DoD.
Learn MoreHuman-Computer Decision Systems for Cybersecurity
• Presentation
By Brian Lindauer
This work discovered a surprising result regarding the potential for non-experts to perform malware family analysis.
Learn MoreIncremental Lifecycle Assurance of Critical Systems
• Presentation
By Peter H. Feiler
Describes research that produced tools for demonstrating a measurable reduction in the cost of verifying system implementation.
Learn MoreLeveraging Serious Games to Assist Motivation and Education
• Presentation
By Rotem D. Guttman
This project seeks to integrate a realistic representation of kinetic operations into cyber training.
Learn MoreMulti-Agent Decentralized Planning for Adversarial Robotic Teams
• Poster
By James Edmondson
This poster, prepared for the SEI 2016 Research Review, visualizes technology development to allow one person to command an entire swarm of UAS.
DownloadMulti-Agent Decentralized Planning for Adversarial Robotic Teams
• Presentation
By James Edmondson
The objective of this work is to allow one person to command an entire swarm of UAS to do mission-level tasks.
Learn MorePrioritizing Alerts from Static Analysis with Classification Models
• Poster
By Lori Flynn
This poster describes CERT Division research on an automated and accurate statistical classifier.
DownloadPrioritizing Alerts from Static Analysis with Classification Models
• Presentation
By Lori Flynn
In this presentation, Lori Flynn describes work toward an automated and accurate statistical classifier, intended to efficiently use analyst effort and to remove code flaws.
Learn MoreProperty Directed Test Case Generation
• Presentation
By Edward J. Schwartz
This work automatically generated executables to trigger desired behaviors for testing.
Learn MoreProperty Directed Test-case Generation
• Poster
By Jeff Gennari
Poster illustrating automatically generated executables to trigger desired behaviors for testing.
DownloadResearch to Operations: Exercise and Simulation Platforms
• Video
By Software Engineering Institute
Research to Operations: Exercise and Simulation Platforms by Jeffrey Mattson
WatchSemiconductor Foundry Verification
• Presentation
By Alexander Volynkin
Volykin presents a research project that aims to use semi-automated image processing to identify semiconductor foundry.
Learn MoreStatistical Model Checking for Swarms
• Poster
By Jeffrey Hansen
This SEI poster created for the 2016 Research Review illustrates input attribution.
DownloadStatistical Model Checking for SWARMS
• Presentation
By Jeffrey Hansen
Research that validates the approach of applying adaptive sampling and input attribution toward model checkInt and attribution of failure conditions
Learn MoreSupporting Software Engineering Best Practices in Additive Manufacturing
• Presentation
By Stephanie Rosenthal
Project developed a framework to support scalable production and customization of 3D models
Learn MoreTactical Analytics
• Poster
By Edwin J. Morris
Recognizing Patterns of Life and Determining Credibility of Textual Data
DownloadTactical Analytics
• Presentation
By Edwin J. Morris
This work aims, in the long term, to build a pipeline to recognize and validate events and patterns
Learn MoreTactical Computing and Communications (TCC)
• Poster
By Grace Lewis
Secure and Efficient Computing and Communications at the Edge
DownloadTactical Computing and Communications
• Presentation
By Grace Lewis
Discusses work in trusted identities, secure VM migration, and delay-tolerant data sharing
Learn MoreUsing Technical Debt to Improve Software Sustainability and Find Software Vulnerabilities
• Presentation
By Ipek Ozkaya, Robert Nord
This presentation introduces analytics use of technical debt.
Learn MoreUsing Technical Debt to Improve Software Sustainability
• Poster
By Ipek Ozkaya
Poster from a 2016 Research Review presentation introducing analytics use of technical debt.
DownloadVerifying DART Systems
• Presentation
By Sagar Chaki, Dionisio de Niz
This work is producing validated assurance techniques for distributed adaptive real-time (DART) systems
Learn MoreVerifying Distributed Adaptive Real-Time (DART) Systems
• Presentation
By Sagar Chaki, Dionisio de Niz
This 2015 Research Review presentation describes the authors' research efforts in verifying distributed adaptive real-time systems.
Learn MoreVirtual System Integration
• Video
By Peter H. Feiler
Peter Feiler presents the SEI's work with virtual system integration and the SAE ADL standard behind it.
WatchVulnerability Discovery
• Poster
By David Warren
The Poster illustrates the "Vulnerability Discovery" presentation by Edward J. Schwartz and David Warren at Research Review 2016.
DownloadVulnerability Discovery
• Presentation
By Edward J. Schwartz, David Warren
The overall aim is to increase the assurance of DoD software through enhanced vulnerability discovery techniques.
Learn MoreWorkplace Violence and IT Sabotage: Two Sides of the Same Coin
• Presentation
By Michael C. Theis
Work objective is to determine if coherent, integrated, and validated indicators for insider workplace violent and insider cyber sabotage can be found.
Learn MoreWorkplace Violence and IT Sabotage
• Poster
By Michael C. Theis
This poster illustrates research conducted to identify common indicators of Insider Workplace Violence (WPV) and Insider Cyber Sabotage (ICS).
DownloadWhy Did the Robot Do That?
• Poster
By Stephanie Rosenthal
Poster of presentation delivered at the SEI Research Review 2016.
DownloadWhy Did the Robot Do That?
• Presentation
By Stephanie Rosenthal
Investigated how having robots automatically explain their behavior using natural language would improve users' trust.
Learn More