CMU SEI 2017 Research Review
• Collection
Publisher
Software Engineering Institute
Abstract
This collection of presentations and posters and other material from our 2017 Research Review exemplifies the way we value our applied research and development (AR&D) in software and cybersecurity according to its impact on capability of the U.S. Department of Defense (DoD) to continually and rapidly develop and deploy innovative, software-enabled components and systems that are affordable, resilient, and easy to modify. We focus our AR&D on data-driven, formally verified, and automated development support across the system lifecycle. We produce algorithms, tools, techniques, and practices that address critical technology gaps. Further, we deliver capabilities through an execution model that combines our AR&D with customer engagement and our deep expertise in forming, applying, and transitioning solutions that improve the state of the practice in software engineering and cybersecurity.
Collection Items
CMU SEI 2017 Research Review Summaries
• Annual Report
By Software Engineering Institute
Short descriptions for FY2017 DoD-funded research projects.
ReadAutomated Assurance of Security Policy Enforcement (2017)
• Poster
By Peter H. Feiler, Sam Procter
Poster for a research project on safety-critical system security policy enforcement
DownloadAutomated Assurance of Security Policy Enforcement (2017)
• Presentation
By Peter H. Feiler, Sam Procter
Presentation on research to detect vulnerabilities early in the lifecycle in architecture models
Learn MoreFAA-Sponsored Research on Complexity and Safety
• Video
By Software Engineering Institute
Watch SEI Researcher, Sarah Sheard, discuss "FAA-Sponsored Research on Complexity and Safety".
WatchGuided Architecture Trade Space Exploration for Safety-Critical Software Systems
• Poster
By Sam Procter
Poster on research into tools to evaluate trade space for embedded systems
DownloadGuided Architecture Trade Space Exploration for Safety-Critical Software Systems
• Presentation
By Sam Procter
Presentation on research to create new tool prototype that automatically explores a system's trade space
Learn MoreInference of Memory Bounds
• Presentation
By William Klieber
Presentation on research to develop an algorithm to automatically infer the bounds of memory regions
Learn MoreInference of Memory Bounds
• Poster
By William Klieber
Poster on research to develop an algorithm to automatically infer the bounds of memory regions
DownloadA Game-Theoretic Approach to Optimizing Behaviors in Acquisition
• Presentation
By William E. Novak
This presentation discusses research on using game theory in acquisition.
Learn MoreGetting Contractors to Cooperate
• Poster
By William E. Novak
A poster describing work on a project entitled A Game-Theoretic Approach to Optimizing Acquisition Behaviors
Download