Finding and fixing weaknesses and vulnerabilities in source code has been an ongoing challenge. There is a lot of excitement about the ability of large language models (LLMs, e.g., GenAI) to produce ...
Contact the Software Acquisition Go Bag team.
In this webcast, Brett Tucker, Dan Justice, and Matthew Butkovic will discuss the challenges to be expected with the realization of quantum computing capabilities.
Bernaciak, C., and Ross, D., 2022: How Easy Is It to Make and Detect a Deepfake?. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Dormann, W., 2018: When "ASLR" Is Not Really ASLR - The Case of Incorrect Assumptions and Bad Defaults. Carnegie Mellon University, Software Engineering Institute's ...
Sherman, M., 2024: Using ChatGPT to Analyze Your Code? Not So Fast. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed October 1 ...
Brown, N., 2021: Taking DevSecOps to the Next Level with Value Stream Mapping. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed ...
CERT/CC advisories are now part of the US-CERT National Cyber Awareness System. We provide these advisories, published by year, for historical purposes. This report details the description, impact, ...
Palat, J., 2022: A Hitchhiker’s Guide to ML Training Infrastructure. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed October ...
Morrow, T., 2018: 12 Risks, Threats, & Vulnerabilities in Moving to the Cloud. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed ...
Before you build a software system, you need to clarify the capabilities it must deliver. The SEI Quality Attribute Workshop helps you identify important quality attributes before there is a software ...
Software is vital to our country’s global competitiveness, innovation, and national security. It also ensures our modern standard of living and enables continued advances in defense, infrastructure, ...