- Agile
- Artificial Intelligence Engineering
- CERT/CC Vulnerabilities
- Cloud Computing
- CSIRT Development
- Cyber Workforce Development
- Cyber-Physical Systems
- Cybersecurity Engineering
- DevSecOps
- Enterprise Risk and Resilience Management
- Insider Threat
- Quantum Computing
- Reverse Engineering for Malware Analysis
- Secure Development
- Situational Awareness
- Software Architecture
- Software Engineering Research and Development
- Technical Debt
Challenges in Making the Transition to Digital Engineering
Challenges observed in making the transition from traditional development practices to digital engineering (DE).
• By Bill Nichols
Technical Issues in Navigating the Transition from Sustainment to Engineering Software-Reliant Systems
This post explores technical issues that must be addressed as sustainment teams transition to organic software engineering responsibilities.
• By Thomas Evans, Michael Gagliardi, Mena Kostial, Nicholas Reimer, Douglas C. Schmidt
In Software Engineering Research and Development
Operating at the Edge
Concepts and challenges for operating in remote locations away from central computing resources where resources are constrained (the edge).
• By Marc Novakouski, Grace Lewis
In Cloud Computing
From Model-Based Systems and Software Engineering to ModDevOps
Introduction to ModDevOps, an extension of DevSecOps that embraces model-based systems engineering (MBSE) technology
• By Jerome Hugues, Joe Yankel
In DevSecOps
Software Engineering as a Strategic Advantage: A National Roadmap for the Future
The SEI led the community in creating this multi-year research and development vision and roadmap for engineering next-generation software-reliant systems.
• By Anita Carleton, John Robert, Mark Klein, Erin Harper
In Software Engineering Research and Development
11 Leading Practices When Implementing a Container Strategy
While containers are frequently lauded in the latest software development trends, switching from using virtual machines and deploying an organization-wide container strategy remains non-trivial.
• By Andrew Mellinger, William Nichols, Jay Palat
In Secure Development
Two Tools for Malware Analysis and Reverse Engineering in Ghidra
This post presents two tools for malware analysis and reverse engineering in Ghidra, the National Security Agency’s software reverse engineering tool suite.
• By Jeffrey Gennari
In Reverse Engineering for Malware Analysis
Release of SCAIFE System Version 2.0.0 Provides Support for Continuous-Integration (CI) Systems
Key features in new release of SCAIFE System Version 2.0.0 including support for continuous-integration (CI) systems, and status of evolving SEI SCAIFE work
• By Lori Flynn
In Secure Development
GhiHorn: Path Analysis in Ghidra Using SMT Solvers
We believe that many common challenges in malware analysis and reverse engineering can be framed in terms of finding a path to a specific point in a program.
• By Jeffrey Gennari
In Reverse Engineering for Malware Analysis
A Technique for Decompiling Binary Code for Software Assurance and Localized Repair
The DoD has a significant amount of software available only in binary form. It is impractical to ensure that this software is free from vulnerabilities and malicious code.
• By Will Klieber
In Secure Development
Explore Topics
- Agile
- Artificial Intelligence Engineering
- CERT/CC Vulnerabilities
- Cloud Computing
- CSIRT Development
- Cyber Workforce Development
- Cyber-Physical Systems
- Cybersecurity Engineering
- DevSecOps
- Enterprise Risk and Resilience Management
- Insider Threat
- Quantum Computing
- Reverse Engineering for Malware Analysis
- Secure Development
- Situational Awareness
- Software Architecture
- Software Engineering Research and Development
- Technical Debt
Get updates on our latest work.
Sign up to have the latest post sent to your inbox weekly.
Get updates on our latest work.
Each week, our researchers write about the latest in software engineering, cybersecurity and artificial intelligence. Sign up to get the latest post sent to your inbox the day it's published.