Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 240 results for Publish Year - 2017

Podcast | December 2017 - Podcast 5 Best Practices for Preventing and Responding to Insider ... By Randall F. Trzeciak

Randy Trzeciak, technical manager of the CERT National Insider Threat Center, discusses five best practices for preventing and responding to insider threat.

Brochure | December 2017 - Brochure Fall 2017 Edition of the Secure Coding Newsletter

The CERT Secure Coding team requests contributors for Ada guidelines it's developing, describes its collaborations with MITRE, and announces its open research positions.

Conference Paper | December 2017 - Conference Paper Open-source Measurement of Fast-flux Networks While ... By Leigh B. Metcalf, Daniel Ruef, Jonathan Spring

In this paper, domain parking is the practice of assign- ing a nonsense location to an unused fully-qualified domain name (FQDN) to keep it ready for “live” use.

Video | December 2017 - Video SEI Cyber Minute: Obsidian: A Safer Blockchain Language By Eliezer Kanal

By creating a secure-by-design language that renders certain types of bugs impossible to create, we aim to significantly reduce the risk inherent in the adoption of blockchain technology.

Podcast | December 2017 - Podcast Pharos Binary Static Analysis: An Update By Jeff Gennari

Jeff Gennari discusses updates to the Pharos framework, which automates reverse engineering of malware analysis, including new tools, improvements, and bug fixes.

Video | December 2017 - Video SEI Cyber Minute: Preventing the Next Heartbleed By William Klieber

Watch Will Klieber in this SEI Cyber Minute as he discusses Inference of Memory Bounds: Preventing the Next Heartbleed.

Presentation | December 2017 - Presentation Model-Driven Insider Threat Control Selection and ... By Randall F. Trzeciak, Daniel L. Costa

This presentation discusses how organizations can identify, prioritize, and select appropriate security controls.

White Paper | December 2017 - White Paper Embedded Device Vulnerability Analysis Case Study Using ... By Madison Oliver, Kyle O'Meara

This document provides security researchers with a repeatable methodology to produce more thorough and actionable results when analyzing embedded devices for vulnerabilities.

Webinar | December 2017 - Webinar Four Valuable Data Sources for Network Security Analytics By Timothy J. Shimeall

This webinar focused on the development and application of combined data analytics and offered several examples of analytics that combine domain resolution data, network device inventory and configuration data, and intrusion detection.

Software | December 2017 - Software ADIA

ADIA is a VMware-based appliance used for small-to-medium sized digital investigations.

Refine