CMU SEI 2018 Research Review
This is a collection of digital artifacts from our review of FY2018 DoD-funded research projects and related activities.
Abstract
This collection of presentations and posters and other material from our Research Review demonstrates our DoD-funded research in the following areas: risk reduction for rapid, affordable software development; creating operational resilience; making the recently possible mission practical; and automating test and evaluation. Among the presentations in the event were brief discussions called "lightning talks"; those short talks are included in this collection.
Collection Contents
-
Automated Program Repair
October 24, 2018 • Video
Watch Researchers, Will Klieber and Claire Le Goues, discuss "Automated Program Repair".
watch -
Automated Code Generation for Future-Compatible High-Performance Graph Libraries
October 22, 2018 • Video
Watch researchers, Scott McMillan and Franz Franchetti, discuss "Continuous Iterative Development and Deployment Practices".
watch -
Assuring Non-Deterministic Software-Based Systems
October 23, 2018 • Presentation
By Dionisio de Niz
Research Review 2018 presentation on explainable AI and runtime assurance enforcer research
read -
Causal Learning & Discovery
October 25, 2018 • Video
Watch CMU Researchers, David Danks and Robert Stoddard, discuss "Causal Learning & Discovery"
watch -
Operational Cyber Risk Reduction
October 24, 2018 • Presentation
By April Galyardt, Josh Hammerstein
Approaches for cyber risk reduction
read -
Modern Software Lifecycle Practices
October 24, 2018 • Presentation
By Ipek Ozkaya, Sam Procter
Discussion of FY18 DoD Line-funded research into techical debt and security engineering
read -
Panel Session: Applying Artificial Intelligence
October 22, 2018 • Video
Panel Session: Applying Artificial Intelligence
watch -
Panel Session: Rapid Velocity Software Development for Mature Organizations
October 22, 2018 • Video
Panel Session: Rapid Velocity Software Development for Mature Organizations
watch -
Scaling Software Testing and Evaluation
October 24, 2018 • Presentation
By Lori Flynn
Discussion of FY18 CMU SEI research in test and evaluation
read -
Continuous Iterative Development and Deployment Practices
October 23, 2018 • Presentation
By Eileen Wrubel, Hasan Yasar
Discussion of Agile and DevOps approaches
read -
Software for Mission
October 24, 2018 • Presentation
By Kevin A. Pitstick, Oren Wright
Discussion of DoD Line-funded research into video summarization and biometric algorithms
read -
Capitalizing on Cloud Technologies
October 24, 2018 • Presentation
By Dale Alleshouse
Information on making use of cloud technologies
read -
You Can Prove It With Less: Data Science Tasks Using Challenge-Based Acquisition
October 24, 2018 • Presentation
By Ritwik Gupta
Information on a use of data science
read -
Explainable AI and Human Computer Interaction
October 24, 2018 • Presentation
By April Galyardt
discussion of explainable AI
read -
Mission-Capable Quantum Computing for Software Verification and Validation
October 24, 2018 • Presentation
By Jason Larkin
quantum computing
read -
How Human-Centered Design can help create DoD Capability
October 24, 2018 • Presentation
By Barbora Batokova
human-centered design
read -
Project Summaries and Posters: 2018 Research Review
October 24, 2018 • Annual Report
Summaries of 2018 Line-funded research projects
read -
Building Knowledge from Inference: Logical Language Models for Cybersecurity
October 24, 2018 • Presentation
By Lena Pons
cybersecurity models
read -
Leveraging Emerging Changes in Computing
October 23, 2018 • Presentation
By Grace Lewis
Discussion of new technologies
read -
A Novel Approach to Emotion Recognition from Voice
October 23, 2018 • Poster
By Oren Wright
This poster describes work toward a new emotional speech database and a set of techniques that can capture finer nuances than the current state of the art.
read -
Automatically Understanding Executables
October 23, 2018 • Poster
By Cory Cohen
This poster describes research aimed at reducing the cost of manual executable analysis for vulnerability discovery and malware analysis.
read -
Causal Models for Software Cost Control (SCOPE)
October 23, 2018 • Poster
By Michael D. Konrad
This poster describes work in applying causal learning to program datasets to better understand which factors can reduce costs.
read -
Automatic Code Generation for Graph Algorithms
October 23, 2018 • Poster
By Scott McMillan, Franz Franchetti (Carnegie Mellon University)
This poster describes automated code generation of high-performance libraries of graph algorithms, tuned for different hardware architectures.
read -
Automated Code Repair to Ensure Memory Safety (2018)
October 23, 2018 • Poster
By William Klieber
This poster describes a technique for automatically repairing potential violations of memory safety so that the program is provably memory-safe.
read -
Building a COTS Benchmark Baseline for Graph Analytics
October 23, 2018 • Poster
By Scott McMillan
This poster describes research aimed at building a benchmark baseline based on commercial off-the-shelf (COTS) field-programmable gate array (FPGA) hardware.
read -
Certifiable Distributed Runtime Assurance
October 23, 2018 • Poster
By Dionisio de Niz
This poster describes the use of enforcers to assure the safety of distributed cyber-physical systems.
read -
High Assurance Software-Defined IoT Security
October 23, 2018 • Poster
By Grace Lewis
This poster describes a solution for the secure use of IoT devices in the DoD by moving part of the security enforcement to the network.
read -
Infrastructure as Code
October 23, 2018 • Poster
By John Klein
This poster describes an approach and tools for recovering a deployed system's technical baseline.
read -
Integrated Safety and Security Engineering for Mission Critical Systems (2018)
October 23, 2018 • Poster
By Peter H. Feiler, Sam Procter
This poster describes progress in the first year of a three-year project aimed at understanding interactions between safety and security.
read -
Modeling and Explaining Sequential Behavior
October 23, 2018 • Poster
This poster describes two research projects that offer novel solutions toward modeling and explaining sequential behavior.
read -
Modeling the Operations of the Vulnerability Ecosystem
October 23, 2018 • Poster
By Allen D. Householder
This poster describes models, metrics, datasets, and key performance indicators developed to improve vulnerability response.
read -
Predicting Security Flaws through Architectural Flaws
October 23, 2018 • Poster
By Robert Schiela, Rick Kazman
This poster describes efforts toward using automated architecture analysis to identify, prevent, and mitigate security flaws in code.
read -
Rapid Construction of Accurate Automatic Alert Handling
October 23, 2018 • Poster
By Lori Flynn
This poster describes the development of an extensible architecture for the classification and advanced prioritization of flaws in code.
read -
Rapid Software Composition by Assessing Untrusted Components
October 23, 2018 • Poster
By Rick Kazman
This poster describes efforts to increase the speed and confidence of the component selection process in software systems.
read -
Summarizing and Searching Video
October 23, 2018 • Poster
By Edwin J. Morris, Kevin A. Pitstick
This poster describes algorithms and a prototype developed to help analysts process information from video streams.
read -
Data-Driven Technical Debt Analysis
October 23, 2018 • Poster
By Ipek Ozkaya, Robert Nord
This poster describes research efforts in analyzing data to uncover technical debt.
read -
Timing Verification of Undocumented Multicore
October 23, 2018 • Poster
By Bjorn Andersson
This poster describes an abstraction and corresponding analysis that allow timing verification of undocumented hardware.
read -
Towards Security Defect Prediction with AI
October 23, 2018 • Poster
By Nathan M. VanHoudnos
This poster describes research comparing a state-of-the-art AI system to existing static analysis approaches for defect prediction.
read