SEI Digital Library
Latest Publications

A New Performance Zone for Software for National Security
• Webcast
In this webcast, Hasan Yasar, Will Hayes, and Joe Yankel assert that software engineering practices are an ingredient that should not be left behind as national security and defense organizations …
Watch
2024 SEI Year in Review
• Annual Report
The 2024 SEI Year in Review highlights the work of the institute undertaken during the fiscal year spanning October 1, 2023, to September 30, 2024.
Read
A Socio-Technical Perspective on Software Vulnerabilities: A Causal Analysis
• Article
This article investigates the causal relationships between the social behaviors of people developing software and effectively maintaining files related to software vulnerabilities.
Read
Identifying and Mitigating Cyber Risk
• Webcast
In this webcast, Matt Butkovic, Greg Crabbe, and Beth-Anne Bygum explore how best to align business and resilience objectives.
Watch
Updating Risk Assessment in the CERT Secure Coding Standard
• Podcast
This podcast explores proposed risk assessment updates to the CERT Secure Coding Standard.
Listen
Malware Research: If You Cannot Replicate it, You Will Not Use It
• Webcast
In this webcast, Leigh Metcalf and Edward Schwartz recommend ways to overcome the problem of replicating and reproducing academic malware research results, so that new and needed concepts and tools …
Watch
Delivering Next Generation Cyber Capabilities to the Warfighter
• Podcast
Gregory Touhill discusses work by CERT researchers and technologists to deliver rapid capabilities to warfighters in the DoD.
Listen
Kubernetes (k8s) in the Air Gap
• White Paper
This paper explains how the act of mirroring the required container images for a k8s deployment in the air gap has become increasingly simplified in the past few years.
Read
Center for Calibrated Trust Measurement and Evaluation (CaTE)—Guidebook for the Development and TEVV of LAWS to Promote Trustworthiness
• White Paper
This guidebook supports personnel in the development and testing of autonomous weapon systems that employ ML, focusing on system reliability and operator trust.
Read
Reference Architecture for Assuring Ethical Conduct in LAWS
• White Paper
This reference architecture provides guidance to reason about designing and developing ML-enabled autonomous systems that have the capability to use lethal force.
Read