Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type


Publication Date

Showing 1 - 10 of 217 results for the Publish Year - 2017

Brochure | December 2017 - Brochure Fall 2017 Edition of the Secure Coding Newsletter

The CERT Secure Coding team requests contributors for Ada guidelines it’s developing, describes its collaborations with MITRE, and announces its open research positions.

Conference Paper | December 2017 - Conference Paper Open-source Measurement of Fast-flux Networks While ... By Leigh B. Metcalf, Daniel Ruef, Jonathan Spring

In this paper, domain parking is the practice of assign- ing a nonsense location to an unused fully-qualified domain name (FQDN) to keep it ready for “live” use.

Video | December 2017 - Video SEI Cyber Minute: Obsidian: A Safer Blockchain Language By Eliezer Kanal

By creating a secure-by-design language that renders certain types of bugs impossible to create, we aim to significantly reduce the risk inherent in the adoption of blockchain technology.

Video | December 2017 - Video SEI Cyber Minute: Preventing the Next Heartbleed By William Klieber

Watch Will Klieber in this SEI Cyber Minute as he discusses

Presentation | December 2017 - Presentation Model-Driven Insider Threat Control Selection and ... By Randall F. Trzeciak, Daniel L. Costa

This presentation discusses how organizations can identify, prioritize, and select appropriate security controls.

White Paper | December 2017 - White Paper Embedded Device Vulnerability Analysis Case Study Using ... By Madison Oliver, Kyle O'Meara

This document provides security researchers with a repeatable methodology to produce more thorough and actionable results when analyzing embedded devices for vulnerabilities.

Software | December 2017 - Software ADIA

ADIA is a VMware-based appliance used for small-to-medium sized digital investigations.

Video | November 2017 - Video SEI Cyber Minute: Automated Reverse Engineering with ... By Jeff Gennari

Reverse engineering is a challenging and time consuming process that traditionally requires skilled and experienced analysts. The Pharos framework includes a number of utilities and tools to automate common reverse engineering tasks.

Brochure | November 2017 - Brochure CERT Insider Threat Center By CERT Insider Threat Center

This booklet describes the CERT Insider Threat Center's purpose, products, and services, including assessments, workshops, courses, and certificate programs.

Brochure | November 2017 - Brochure CERT Cybersecurity Training & Education Catalog

This catalog summarizes the cybersecurity courses and certificates offered by the CERT Division of the SEI.