Logo

    SEI Shorts

    In these short videos, experts from the Software Engineering Institute (SEI) deliver informative snapshots of our latest research on the changing world of all things cyber. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University.
    en102 Episodes

    People also ask

    What is the main theme of the podcast?
    Who are some of the popular guests the podcast?
    Were there any controversial topics discussed in the podcast?
    Were any current trending topics addressed in the podcast?
    What popular books were mentioned in the podcast?

    Episodes (102)

    Exploring the System Design Tradespace

    Exploring the System Design Tradespace

    Here at the Software Engineering Institute, we have created a new tool prototype that helps explore a system’s design tradespace. The tradespace is the possible combinations of system software, hardware, and configuration options. Our prototype – which combines previous work here at the SEI with software developed at Penn State University – enables system designers to evaluate design options in the tradespace rapidly and automatically. You can find more on guided design tradespace exploration in these SEI resources: SEI Cyber Minutes video • Safety-Critical Design by Shopping https://www.youtube.com/watch?v=M8hcV... Poster • Guided Architecture Trade Space Exploration for Safety-Critical Software Systems -- https://resources.sei.cmu.edu/library... Blog • AADL: Four Real-World Perspectives -- https://insights.sei.cmu.edu/sei_blog... real-world-perspectives.htmlhttps://insights.sei.cmu.edu/sei_blog... moving-cloud-computing-to-the-edge.html

    SEI Shorts
    enNovember 08, 2018

    Automating Repair of Pervasive Software Flaws

    Automating Repair of Pervasive Software Flaws

    Manually fixing coding errors is time- and money-consuming. As a result, teams charged to make the fixes can eliminate few vulnerabilities; and fixing errors often breaks the working code, adding unwanted delay in testing. The SEI has developed a tool to detect and automatically repair integer overflow and reads of stale sensitive data, two pervasive software flaws. You can find more on SEI’s technique for automated code repair in “Inference of Memory Bounds: Preventing the Next Heartbleed” at https://insights.sei.cmu.edu/sei_blog....

    For more information, write to info@sei.cmu.edu.

    Build Secure Applications with DevSecOps

    Build Secure Applications with DevSecOps

    Watch Hasan Yasar discuss how to "Build Secure Applications with DevSecOps." DevSecOps is a model on integrating the software development and operational process that considers security activities throughout DevOps pipeline with practicing collaboration and communication between software development teams , IT operations staff along with acquirers, suppliers, security teams, and other stakeholders in the lifecycle of a software system.

    Malfaces: Automating Malware Triage

    Malfaces: Automating Malware Triage

    Malfaces from the Software Engineering Institute is a two-tool process that visualizes similarities between malware input files. The first tool uses binary code comparison techniques and a transform function to determine which input files match. Then, using statistical analysis, the second tool draws Chernoff faces for each file and delivers an estimate of how many unique programs are in the input files set. Together, these tools reduce file analysis to a differential analysis task—saving time and money in reverse engineering after a cyber incident. You can find more on the Malfaces concept in “This Malware Looks Familiar: Laymen Identify Malware Run-time Similarity with Chernoff faces and Stick Figures” at http://eudl.eu/doi/10.4108/eai.22-3-2017.152417

    SQL Injection

    SQL Injection

    Alex Corn describes how SQL injection can occur and how you can prevent attackers from exploiting these potentially serious vulnerabilities.

    SQL injection vulnerabilities are common, and attackers can use them to carry out harmful attacks. This SEI Cyber Minute explains how these attacks can be prevented by using database abstraction libraries or prepared statements.

    SEI Shorts
    enNovember 02, 2018

    Interruption Costs

    Interruption Costs
    Watch SuZ Miller in this SEI Cyber Minute as she discusses "Interruption Costs" in the development process.
    SEI Shorts
    enJune 14, 2018
    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io