This podcast explores updates to the Pointer Ownership Model for C, a modeling framework designed to improve the ability of developers to statically analyze C programs for errors involving temporal ...
Updyke, D., and Jaconski, M., 2022: Using Alternate Data Streams in the Collection and Exfiltration of Data. Carnegie Mellon University, Software Engineering ...
Hugues, J., and Yankel, J., 2021: From Model-Based Systems and Software Engineering to ModDevOps. Carnegie Mellon University, Software Engineering Institute's ...
Proving the absence of use-after-free errors and other temporal memory safety vulnerabilities is complex and costly, particularly in large codebases such as those for mission-critical military systems ...
This newsletter compiles the latest SEI releases and news about the upcoming symposium Cyber Mission Readiness in the Age of AI, using public LLMs to rapidly develop tools for use in classified ...
Ruefle, R., 2017: Critical Asset Identification (Part 1 of 20: CERT Best Practices to Mitigate Insider Threats Series). Carnegie Mellon University, Software ...
This contact form is for general questions and requests for contact. Do not use this contact form to send sensitive information. Please review the guidelines for sending sensitive information. If you ...
Ballman, A., 2014: Thread Safety Analysis in C and C++. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed February 19, 2026 ...
The CERT Division of the Software Engineering Institute helps organizations and national CSIRTs develop, operate, and improve incident management capabilities. This FAQ addresses questions the global ...
Bernaciak, C., and Ross, D., 2022: How Easy Is It to Make and Detect a Deepfake?. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Sible, J., and Svoboda, D., 2022: Rust Software Security: A Current State Assessment. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...