search menu icon-carat-right cmu-wordmark

SEI 2016 Research Review

Artifacts from the SEI 2016 Research Review, October 25-26, 2016

Publisher:

Software Engineering Institute

Presentations and materials pertaining to the review of the SEI FY2016 research portfolio,

SEI Research Review 2016: Project Summaries and Posters

November 2016

This booklet contains concise descriptions of SEI FY16 Line and LENS projects.

Auto-Active Verification of Software with Timers and Clocks

November 2016

Software that accesses the system clock is the key to real-time and cyber-physical systems

Automated Assurance of Security Policy Enforcement

November 2016

Security is not only a matter of code. This work extends the AADL with security design rules

Automated Code Repair

October 2016

Integer overflow in calculations related to array bounds or indices is almost always a bug

Automated Code Repair

November 2016

Work aims to develop technique to eliminate security vulnerabilities at a lower cost than manual repair

The Critical Role of Positive Incentives for Reducing Insider Threats

December 2016

This report describes how positive incentives complement traditional practices to provide a better balance for organizations' insider threat programs.

The Critical Role of Positive Incentives in Reducing Insider Threat

November 2016

Investigated job engagement, perceived organizational support, and connectedness at work

Data Validation for Large-Scale Analytics

October 2016

Building Tools to Support Data Sampling and Visualization

Enabling Evidence-Based Modernization

October 2016

Evidence-Based Modernization (EEBM)

Enabling Evidence Based Modernization

November 2016

The goal of is work is to develop a lightweight method for representing alternatives

Establishing Coding Requirements for Non-Safety-Critical C++

October 2016

Establishing Coding Requirements for Non-Safety-Critical C++

Establishing Coding Requirements for Non-Safety-Critical C++ Systems

November 2016

Developed checkers, rules, and rule organization for secure C++ code

Evaluation of Threat Modeling Methodologies

November 2016

The result of this work is a set of test principles that can help Programs select the most appropriate threat modeling methodologies.

Evaluation of Threat Modeling Methodologies

October 2016

Evaluation of Threat Modeling Methodologies

Experiences Developing an IBM Watson Cognitive Processing Application

November 2016

Inquiry into whether DoD could use IBM Watson to improve assurance

Generalized Automated Cyber-Readiness Evaluation

November 2016

Applies principles of train as you fight and evaluate as you fight to cyber workforce development

GraphBLAS: A Programming Specification for Graph Analysis

November 2016

Describes work in graph analysis, an important and pervasive areas for the DoD

Human-Computer Decision Systems for Cybersecurity

November 2016

This work discovered a surprising result regarding the potential for non-experts to perform malware family analsys

Incremental Lifecycle Assurance of Critical Systems

November 2016

Describes research that produced tools for demonstrating a measurable reduction in the cost of verifying system implmementations

Leveraging Serious Games to Assist Motivation and Education

November 2016

Project seeks to integrate realistic representation of kinetic operations into cyber training

Multi-Agent Decentralized Planning for Adversarial Robotic Teams

November 2016

Objective of this work is to allow one person to command an entire swarm of UAS to do mission-level tasks

Prioritizing Alerts from Static Analysis with Classification Models

October 2016

This poster describes CERT Division research on an automated and accurate statistical classifier.

Prioritizing Alerts from Static Analysis with Classification Models

November 2016

In this presentation, Lori Flynn describes work toward an automated and accurate statistical classifier, intended to efficiently use analyst effort and to remove code flaws.

Property Directed Test Case Generation

November 2016

This work automatically generated executables to trigger desired behaviors for testing

Property Directed Test-case Generation

October 2016

Property Directed Test-case Generation

Semiconductor Foundry Verification

November 2016

Work aims to use semi-automated image processing to identify semiconductor foundry

Statistical Model Checking for Swarms

October 2016

Input Attribution

Statistical Model Checking for SWARMS

November 2016

Research that validates approach of applying adaptive sampling and input attribution toward model checkint and attribution of failure conditions

Supporting Software Engineering Best Practices in Additive Manufacturing

November 2016

Project developed a framework to support scalable production and customization of 3D models

Tactical Analytics

October 2016

Recognizing Patterns of Life and Determining Credibility of Textual Data

Tactical Analytics

November 2016

This work aims, in the long term, to build a pipeline to recognize and validate events and patterns

Tactical Computing and Communications (TCC)

October 2016

Secure and Efficient Computing and Communications at the Edge

Tactical Computing and Communications

November 2016

Discusses work in trusted identities, secure VM migration, and delay-tolerant data sharing

Verifying DART Systems

November 2016

This work is producing validated assurance techniques for distributed adaptive real-time (DART) systems

Verifying Distributed Adaptive Real-Time (DART) Systems

October 2015

This 2015 Research Review presentation describes the authors' research efforts in verifying distributed adaptive real-time systems.

Vulnerability Discovery

October 2016

Vulnerability Discovery

Vulnerability Discovery

November 2016

Overall aim is to increase assurance of DoD software through enhanced vulnerability discovery techniques

Workplace Violence and IT Sabotage: Two Sides of the Same Coin

November 2016

Work objective is to determine if coherent, integrated, and validated indicators for insider workplace violent and insider cyber sabotage can be found

Workplace Violence and IT Sabotage

October 2016

Determine if indicators for Insider Workplace Violence and Insider Cyber Sabotage can be identified

Why did the robot do that?

October 2016

Why did the robot do that?

Why did the Robot do That?

November 2016

Investigated how having robots automatically explain their behavior using natural language would improve users' trust