search menu icon-carat-right cmu-wordmark

2017 SEI Year in Review Resources

Rsources for further information on topics discussed in the 2017 SEI Year in Review


Software Engineering Institute

Thank you for reading the 2017 SEI Year in Review. The following resources provide more information about the topics addressed individual articles in the Year in Review. The Table of Contents presents the 2017 SEI Year in Review article title followed by the related resources. A list of links at the bottom of the page provide author information and brief summaries for each item.

Using Ground-Truth Data Sets as Engines of Innovation

Ultra-Large-Scale Systems: More than a Decade of Influence

Bridging Science and Practice to Build Cybersecurity Knowledge and Skills

Making Biometric Data Extraction Mission Practical

Getting a Handle on Big Learning Platform Performance

Building Trust Between Humans and Autonomous Systems

SEI Research Combats Mounting Acquisition Costs

Reporting DoD Network Vulnerabilities: It Just Got Easier

Assuring Autonomous Systems that Operate in Mission Environments

Pushing R&D to the Front Lines

Enabling Elusive Systems: Adaptive Cyber Defense for Networks

Anytime, Anywhere Training for Cyber Operators

A Fighting Chance: Arming the Analyst in the Age of Big Data

Automated Code Analysis and Transformation

Building the Cyber Capacity of International Partners


Why Does Software Cost So Much? Toward a Causal Model (March 2017)

March 2017

This presentation shares early research results that may confirm some well-known drivers of DoD software cost and debunk others.

Common Sense Guide to Mitigating Insider Threats, Fifth Edition

December 2016

Presents recommendations for mitigating insider threat based on CERT's continued research and analysis of over 1,000 cases.

Quantifying Uncertainty in Early Lifecycle Cost Estimation (QUELCE)

December 2011

The method of quantifying uncertainty described in this report synthesizes scenario building, Bayesian Belief Network (BBN) modeling and Monte Carlo simulation into an estimation method that quantifies uncertainties, allows subjective inputs, visually depicts influential relationships among program change drivers and outputs, and assists with the explicit description and documentation underlying an estimate.

DoD Software Factbook

December 2015

This DoD Factbook is an initial analysis of software engineering data from the perspective of policy and management questions about software projects.

Ultra-Large-Scale Systems: The Software Challenge of the Future

June 2006

Ultra-Large-Scale Systems: The Software Challenge of the Future is the product of a 12-month study of ultra-large-scale (ULS) systems software.

Using Serious Games

October 2016

Leveraging: Cyber Kinetic Effects Integration (CKEI)

Real-Time Extraction of Heart Rate from Video

July 2017

This technical sheet details our project to extract heart rate from commodity video in real time.

Micro-Expressions: More than Meets the Eye

October 2017

Presentation on research to build an accurate, automatic micro-expression analysis prototype that outperforms humans in spotting and recognizing facial micro-expressions in near real time

Measuring Performance of Big Learning Workloads

October 2017

Poster on research to build a performance measurement workbench with tools to measure and report performance of large-scale ML platforms

Why did the robot do that?

October 2016

Why did the robot do that?

What will the Robot do Next?

October 2017

Presentation on research to build algorithms that allow robots to explain their behaviors to users and adapt their behavior during execution to enable users to accurately predict what they will do next

Certifiable Runtime Assurance of Distributed Real-Time Systems

January 2017

This paper presents two challenge problems guiding research on developing a provably correct approach for runtime assurance of distributed real-time embedded systems.

The CERT Guide to Coordinated Vulnerability Disclosure

August 2017

This guide provides an introduction to the key concepts, principles, and roles necessary to establish a successful Coordinated Vulnerability Disclosure process. It also provides insights into how CVD can go awry and how to respond when it does so.

Events, Relationships, and Script Learning for Situational Awareness

October 2017

Poster for research into using machine learning to extract patterns from high volumes of textual data

Department of Defense Software Factbook

July 2017

In this report, the Software Engineering Institute has analyzed data related to DoD software projects and translated it into information that is frequently sought-after across the DoD.

Why Does Software Cost So Much? Towards a Causal Model

October 2017

Poster on research to build an actionable, full causal model of software cost factors

Cyber Affordance Visualization in Augmented Reality

October 2017

Poster on research to integrate cyber effects into tactical decision-making for soldiers

Design Pattern Recovery from Malware Binaries Poster (SEI 2015 Research Review)

October 2015

This poster displays three tools for static analysis.

CERT BFF: From Start to PoC

June 2016

This presentation describes the CERT Basic Fuzzing Framework (BFF) from start to PoC.

Automated Code Repair Based on Inferred Specifications

November 2016

In this paper, the authors describe automated repairs for three types of bugs: integer overflows, missing array bounds checks, and missing authorization checks.