SEI 2016 Research Review
Artifacts from the SEI 2016 Research Review, October 25-26, 2016
Publisher:
Software Engineering Institute
Abstract
Presentations and materials pertaining to the review of the SEI FY2016 research portfolio,
Collection Contents
-
SEI Research Review 2016: Project Summaries and Posters
November 29, 2016 • Annual Report
This booklet contains concise descriptions of SEI FY16 Line and LENS projects.
read -
Auto-Active Verification of Software with Timers and Clocks
November 1, 2016 • Presentation
By Sagar Chaki, Dionisio de Niz
Software that accesses the system clock is the key to real-time and cyber-physical systems
read -
Automated Assurance of Security Policy Enforcement
November 1, 2016 • Presentation
By Julien Delange
Security is not only a matter of code. This work extends the AADL with security design rules
read -
Automated Code Repair
October 18, 2016 • Poster
By William Klieber
Integer overflow in calculations related to array bounds or indices is almost always a bug
read -
Automated Code Repair
November 1, 2016 • Presentation
By William Klieber
Work aims to develop technique to eliminate security vulnerabilities at a lower cost than manual repair
read -
The Critical Role of Positive Incentives for Reducing Insider Threats
December 15, 2016 • Technical Report
By Andrew P. Moore, Jeff Savinda, Elizabeth A. Monaco, Jamie L. Moyes, Denise M. Rousseau (Carnegie Mellon University), Samuel J. Perl, Jennifer Cowley, Matthew L. Collins, Tracy Cassidy, Nathan VanHoudnos, Palma Buttles-Valdez, Daniel Bauer, Allison Parshall
This report describes how positive incentives complement traditional practices to provide a better balance for organizations' insider threat programs.
read -
The Critical Role of Positive Incentives in Reducing Insider Threat
November 1, 2016 • Presentation
By Andrew P. Moore
Investigated job engagement, perceived organizational support, and connectedness at work
read -
Data Validation for Large-Scale Analytics
October 18, 2016 • Poster
By Stephanie Rosenthal
Building Tools to Support Data Sampling and Visualization
read -
Enabling Evidence-Based Modernization
October 18, 2016 • Poster
By John Klein
Evidence-Based Modernization (EEBM)
read -
Enabling Evidence Based Modernization
November 1, 2016 • Presentation
By John Klein
The goal of is work is to develop a lightweight method for representing alternatives
read -
Establishing Coding Requirements for Non-Safety-Critical C++
October 18, 2016 • Poster
By Aaron Ballman
Establishing Coding Requirements for Non-Safety-Critical C++
read -
Establishing Coding Requirements for Non-Safety-Critical C++ Systems
November 1, 2016 • Presentation
By Aaron Ballman
Developed checkers, rules, and rule organization for secure C++ code
read -
Evaluation of Threat Modeling Methodologies
November 1, 2016 • Presentation
By Forrest Shull
The result of this work is a set of test principles that can help Programs select the most appropriate threat modeling methodologies.
read -
Evaluation of Threat Modeling Methodologies
October 18, 2016 • Poster
By Forrest Shull
Evaluation of Threat Modeling Methodologies
read -
Experiences Developing an IBM Watson Cognitive Processing Application
November 1, 2016 • Presentation
By Mark Sherman
Inquiry into whether DoD could use IBM Watson to improve assurance
read -
Generalized Automated Cyber-Readiness Evaluation
November 1, 2016 • Presentation
By Rotem D. Guttman
Applies principles of train as you fight and evaluate as you fight to cyber workforce development
read -
GraphBLAS: A Programming Specification for Graph Analysis
November 1, 2016 • Presentation
By Scott McMillan
Describes work in graph analysis, an important and pervasive areas for the DoD
read -
Human-Computer Decision Systems for Cybersecurity
November 1, 2016 • Presentation
By Brian Lindauer
This work discovered a surprising result regarding the potential for non-experts to perform malware family analsys
read -
Incremental Lifecycle Assurance of Critical Systems
November 1, 2016 • Presentation
By Peter H. Feiler
Describes research that produced tools for demonstrating a measurable reduction in the cost of verifying system implmementations
read -
Leveraging Serious Games to Assist Motivation and Education
November 1, 2016 • Presentation
By Rotem D. Guttman
Project seeks to integrate realistic representation of kinetic operations into cyber training
read -
Multi-Agent Decentralized Planning for Adversarial Robotic Teams
October 18, 2016 • Poster
By James Edmondson
Robotic Teams
read -
Multi-Agent Decentralized Planning for Adversarial Robotic Teams
November 1, 2016 • Presentation
By James Edmondson
Objective of this work is to allow one person to command an entire swarm of UAS to do mission-level tasks
read -
Prioritizing Alerts from Static Analysis with Classification Models
October 18, 2016 • Poster
By Lori Flynn
This poster describes CERT Division research on an automated and accurate statistical classifier.
read -
Prioritizing Alerts from Static Analysis with Classification Models
November 1, 2016 • Presentation
By Lori Flynn
In this presentation, Lori Flynn describes work toward an automated and accurate statistical classifier, intended to efficiently use analyst effort and to remove code flaws.
read -
Property Directed Test Case Generation
November 1, 2016 • Presentation
By Edward J. Schwartz
This work automatically generated executables to trigger desired behaviors for testing
read -
Property Directed Test-case Generation
October 18, 2016 • Poster
By Jeff Gennari
Property Directed Test-case Generation
read -
Research to Operations: Exercise and Simulation Platforms
January 3, 2017 • Video
Research to Operations: Exercise and Simulation Platforms by Jeffrey Mattson
watch -
Semiconductor Foundry Verification
November 1, 2016 • Presentation
By Alexander Volynkin
Work aims to use semi-automated image processing to identify semiconductor foundry
read -
Statistical Model Checking for Swarms
October 18, 2016 • Poster
By Jeffrey Hansen
Input Attribution
read -
Statistical Model Checking for SWARMS
November 1, 2016 • Presentation
By Jeffrey Hansen
Research that validates approach of applying adaptive sampling and input attribution toward model checkint and attribution of failure conditions
read -
Supporting Software Engineering Best Practices in Additive Manufacturing
November 1, 2016 • Presentation
By Stephanie Rosenthal
Project developed a framework to support scalable production and customization of 3D models
read -
Tactical Analytics
October 18, 2016 • Poster
By Edwin J. Morris
Recognizing Patterns of Life and Determining Credibility of Textual Data
read -
Tactical Analytics
November 1, 2016 • Presentation
By Edwin J. Morris
This work aims, in the long term, to build a pipeline to recognize and validate events and patterns
read -
Tactical Computing and Communications (TCC)
October 18, 2016 • Poster
By Grace Lewis
Secure and Efficient Computing and Communications at the Edge
read -
Tactical Computing and Communications
November 1, 2016 • Presentation
By Grace Lewis
Discusses work in trusted identities, secure VM migration, and delay-tolerant data sharing
read -
Using Technical Debt to Improve Software Sustainability and Find Software Vulnerabilities
November 1, 2016 • Presentation
By Ipek Ozkaya, Robert Nord
Introduces analytics use of technical debt
read -
Using Technical Debt to Improve Software Sustainability
October 18, 2016 • Poster
By Ipek Ozkaya
Technical Debt
read -
Verifying DART Systems
November 1, 2016 • Presentation
By Sagar Chaki, Dionisio de Niz
This work is producing validated assurance techniques for distributed adaptive real-time (DART) systems
read -
Verifying Distributed Adaptive Real-Time (DART) Systems
October 16, 2015 • Presentation
By Sagar Chaki, Dionisio de Niz
This 2015 Research Review presentation describes the authors' research efforts in verifying distributed adaptive real-time systems.
read -
Virtual System Integration
December 8, 2016 • Video
Virtual System Integration by Peter Feiler.
watch -
Vulnerability Discovery
November 1, 2016 • Presentation
By Edward J. Schwartz, David Warren
Overall aim is to increase assurance of DoD software through enhanced vulnerability discovery techniques
read -
Workplace Violence and IT Sabotage: Two Sides of the Same Coin
November 1, 2016 • Presentation
By Michael C. Theis
Work objective is to determine if coherent, integrated, and validated indicators for insider workplace violent and insider cyber sabotage can be found
read -
Workplace Violence and IT Sabotage
October 18, 2016 • Poster
By Michael C. Theis
Determine if indicators for Insider Workplace Violence and Insider Cyber Sabotage can be identified
read -
Why did the robot do that?
October 18, 2016 • Poster
By Stephanie Rosenthal
Why did the robot do that?
read -
Why did the Robot do That?
November 1, 2016 • Presentation
By Stephanie Rosenthal
Investigated how having robots automatically explain their behavior using natural language would improve users' trust
read