Logo

    How can automated code repair help DoD with legacy code vulnerability analysis?

    enNovember 14, 2018
    What was the main topic of the podcast episode?
    Summarise the key points discussed in the episode?
    Were there any notable quotes or insights from the speakers?
    Which popular books were mentioned in this episode?
    Were there any points particularly controversial or thought-provoking discussed in the episode?
    Were any current events or trending topics addressed in the episode?

    About this Episode

    Watch Bob Schiela and Jeff Boleng discuss "How can automated code repair help DoD with legacy code vulnerability analysis?

    Recent Episodes from SEI Shorts

    A New Path to Verifiable Confidence

    A New Path to Verifiable Confidence

    In this SEI Cyber Minute, Bobbie Stempfley explains how in our increasingly complex world, the SEI is redefining approaches to security to address the transformative technologies being adopted throughout government and industry.

    SEI Shorts
    enNovember 05, 2019

    Agile Pitfall in Acquisition: The Bottom of the V

    Agile Pitfall in Acquisition: The Bottom of the V

    In this SEI Cyber Minute, Suzanne Miller explains a pitfall that can occur when trying to use Agile and Lean methods when developing and implementing complex, embedded systems. In such projects, development traditionally proceeds in a model shaped like a “V,” where the completion of requirements definition, architecture, and design occurs along the left branch of the “V” and leads to implementation at the bottom point. Then, the right branch of the “V” represents verification and validation activities. The difficulty is that these projects usually reap the benefits of the iterative, incremental aspects of Agile development only during implementation, after requirements, architecture, and design work are deemed to be finished. At that point, it becomes difficult to apply the lessons learned during implementation and to make necessary changes to the work that occurred before implementation began. Suzanne Miller explains the dynamics of this pitfall, and she describes a more agile and responsive mindset that teams can use to make sure they reap the benefits of Agile and lean approaches throughout development. In addition, she shares reference material that can help interested parties learn more.

    Insider Threat Mitigation, We can help!

    Insider Threat Mitigation, We can help!

    September 2019 has been designated “National Insider Threat Awareness Month.” A number of federal agencies—including the FBI, Office of the Under Secretary of Defense for Intelligence, and Department of Homeland Security—have chosen September to spotlight the risks that insiders pose to national security.

    Since 2001, the SEI’s CERT Division has been helping government, industry, and academic entities identify and mitigate insider threats. The CERT Division’s research spans multiple domains, from the technical, including an exploration of tool sets for insider threat programs, to the behavioral and organizational, including a study on positive incentives for reducing insider threat in the workplace.

    Automating Alert Handling Reduces Manual Effort

    Automating Alert Handling Reduces Manual Effort

    Static analysis (SA) alerts about software code flaws require costly manual effort to validate (e.g., determine True or False) and repair.  As a result, organizations often severely limit the types of alerts they manually examine to the types of code flaws they most worry about. That approach results in a tradeoff where many True flaws may never get fixed. To make alert handling more efficient, the SEI developed and tested novel software that enables the rapid deployment of a method to classify alerts automatically and accurately. We are implementing our solution in a new version of the SEI’s SCALe – the Source Code Analysis Lab – application.

    SCAIFE: An Alert Auditing Classification Prototype

    SCAIFE: An Alert Auditing Classification Prototype

    In this SEI Cyber Minute, Ebonie McNeil explains how the Source Code Analysis Integrated Framework Environment or (SCAIFE) prototype is intended to be used by developers and analysts who manually audit alerts.

    SCAIFE provides automatic alert classification using machine learning which gives a level of confidence that the alert is true or false.

    The SCAIFE prototype also enables organizations to apply formulas that prioritize static analysis alerts by using factors they care about.

    Integrating Threat Modeling with the SERA Method

    Integrating Threat Modeling with the SERA Method

    Threat-modeling methods provide an approach for identifying possible threats to a system and mitigating them. In this SEI Cyber Minute, Chris Alberts discusses the Security Engineering Risk Analysis (SERA) Method and the threats and risks that organizations can use it to model and plan for. In addition, Chris discusses the threat-modeling methods the SEI recently integrated into the SERA Method.

    Using Confidence Maps

    Using Confidence Maps

    Chuck Weinstock introduces confidence maps and explains how they work to determine how much confidence someone can have in a claim.

    Confidence maps collect arguments or doubts about a claim, to which one can then apply a process of elimination to establish how much confidence someone can have that the claim is true. This SEI Cyber Minute gives an example that provides a practical explanation of the information that confidence maps take into consideration and how they work. It also provides a few examples of how the SEI has used them in the past to support certain projects.

    Natural Language Processing for Cybersecurity

    Natural Language Processing for Cybersecurity

    Elli Kanal describes the work that the SEI does to train computers to learn about stored content and find pertinent information without the help of an analyst.

    The Software Engineering Institute (SEI) works on projects that help computers (1) learn about the content that they store and (2) find pertinent information based on what they learn. One particular SEI project involves teaching computers to find clues in specification documents that can lead to the discovery of vulnerabilities without the help of analysts. This SEI Cyber Minute provides a quick overview of these kinds of projects and gives you information about how you can contact the SEI to collaborate on them.

    Moving Cloud Computing to the Tactical Edge

    Moving Cloud Computing to the Tactical Edge

    At the SEI, we built an implementation of tactical cloudlets that we call KD-Cloudlet. Soldiers, emergency workers, field researchers, medics – really anyone who needs to be a cyber forager for computing resources -- can now use KD-Cloudlet to support mobile applications that:

    •contain computation-intensive code

    •collect large amounts of data in the field, or

    •use large amounts of data in the cloud

    KD-Cloudlet is freely available on GitHub: https://github.com/SEI-AMS/pycloud/