Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University
SEI Podcast Series

Selected Category: Cyber-Physical Systems

May 25, 2017

NTP Best Practices

 Jeffrey Smith (Microsoft)

Timur D. Snoke

"A lot of the banking applications that we are using now are using one-time passwords that are only valid for a very distinct period of time. If you can mess with what the computer thinks the time is, then you might be able to set up a window of opportunity."

"A lot of the banking applications that we are using now are using one-time passwords that are only valid for a very distinct period of time. If you can mess with what the computer thinks the time is, then you might be able to set up a window of opportunity."
April 20, 2017

Distributed Artificial Intelligence in Space

 Jeffrey Smith (Microsoft)

James Edmondson

"We are looking at a first prototype in low Earth orbit of about six tiles collaborating, sharing information."

"We are looking at a first prototype in low Earth orbit of about six tiles collaborating, sharing information."
March 23, 2017

10 At-Risk Emerging Technologies

 Jeffrey Smith (Microsoft)

Christopher King

"Although autonomous machines are 5-to-10 years away from mainstream adoption, the devices could be compromised through networked back-end servers that provide some of the automation, or through the robot itself, which is networked and communicates across the Internet to the manufacturer for diagnostic information and software updates."

"Although autonomous machines are 5-to-10 years away from mainstream adoption, the devices could be compromised through networked back-end servers that provide some of the automation, or through the robot itself, which is networked and communicates across the Internet to the manufacturer for diagnostic information and software updates."
November 30, 2016

Moving Target Defense

 Jeffrey Smith (Microsoft)

Andrew O. Mellinger

"Imagine a brick wall, a strong door, a gate or something like that. All those defenses, what they evoke is this kind of big monolithic, static set of walls, OK? Within enterprise networks, what we find is that that gives a lot of opportunity to our attackers to understand what we do."

"Imagine a brick wall, a strong door, a gate or something like that. All those defenses, what they evoke is this kind of big monolithic, static set of walls, OK? Within enterprise networks, what we find is that that gives a lot of opportunity to our attackers to understand what we do."
November 10, 2016

Improving Cybersecurity Through Cyber Intelligence

 Jeffrey Smith (Microsoft)

Jared Ettinger

"Basically cyber intelligence is more like a subset of cybersecurity. It is going to be a forced multiplier to your overall cybersecurity picture or platform for your organization."

"Basically cyber intelligence is more like a subset of cybersecurity. It is going to be a forced multiplier to your overall cybersecurity picture or platform for your organization."