<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Autonomy and Counter-Autonomy</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Autonomy and Counter-Autonomy</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/autonomy-and-counter-autonomy/atom/" rel="self"/><language>en-us</language><lastBuildDate>Wed, 20 Apr 2022 00:00:00 -0400</lastBuildDate><item><title>Six Dimensions of Trust in Autonomous Systems</title><link>https://www.sei.cmu.edu/blog/six-dimensions-of-trust-in-autonomous-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post chronicles the adoption and growth of autonomous systems and provides six considerations for establishing trust.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Paul Nielsen</dc:creator><pubDate>Wed, 20 Apr 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/six-dimensions-of-trust-in-autonomous-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Software Assurance</category><category>Vulnerability Discovery</category><category>Devops</category><category>Artificial Intelligence Engineering</category><category>Machine Learning</category><category>Cybersecurity</category><category>Autonomy and Counter-Autonomy</category><category>Software and Information Assurance</category><category>Human-Machine Interactions</category><category>Artificial Intelligence</category><category>Digital Engineering</category><category>Cyber-Physical Systems</category></item><item><title>Adversarial ML Threat Matrix: Adversarial Tactics, Techniques, and Common Knowledge of Machine Learning</title><link>https://www.sei.cmu.edu/blog/adversarial-ml-threat-matrix-adversarial-tactics-techniques-and-common-knowledge-of-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post introduces the Adversarial ML Threat Matrix, a list of tactics to exploit machine learning models, and guidance on defense against them.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jonathan Spring</dc:creator><pubDate>Thu, 22 Oct 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/adversarial-ml-threat-matrix-adversarial-tactics-techniques-and-common-knowledge-of-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Mitigation</category><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Autonomy and Counter-Autonomy</category></item><item><title>Comments on NIST IR 8269: A Taxonomy and Terminology of Adversarial Machine Learning</title><link>https://www.sei.cmu.edu/blog/comments-on-nist-ir-8269-a-taxonomy-and-terminology-of-adversarial-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The U.S. National Institute of Standards and Technology (NIST) recently held a public comment period on their draft report on proposed taxonomy and terminology of Adversarial Machine Learning (AML)....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jonathan Spring</dc:creator><pubDate>Thu, 13 Feb 2020 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/comments-on-nist-ir-8269-a-taxonomy-and-terminology-of-adversarial-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Autonomy and Counter-Autonomy</category><category>Software and Information Assurance</category><category>System Verification and Validation</category><category>Mission Assurance</category></item><item><title>Deep Learning, Agile-DevOps, and Cloud Security: The Top 10 Blog Posts of 2018</title><link>https://www.sei.cmu.edu/blog/deep-learning-agile-devops-and-cloud-security-the-top-10-blog-posts-of-2018/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Every January on the SEI Blog, we present the 10 most-visited posts of the previous year. This year's top 10, which features posts published between January 1, 2018, and December 31, 2018....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 07 Jan 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/deep-learning-agile-devops-and-cloud-security-the-top-10-blog-posts-of-2018/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Autonomy and Counter-Autonomy</category><category>Cloud Computing</category><category>Data Modeling and Analytics</category><category>Mission Assurance</category><category>Software and Information Assurance</category></item><item><title>Translating Between Statistics and Machine Learning</title><link>https://www.sei.cmu.edu/blog/translating-between-statistics-and-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post explores the differences between statistics and machine learning and how to translate statistical models into machine learning models.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Zachary Kurtz</dc:creator><pubDate>Mon, 19 Nov 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/translating-between-statistics-and-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Artificial Intelligence Engineering</category><category>Machine Learning</category><category>Artificial Intelligence</category><category>Autonomy and Counter-Autonomy</category></item><item><title>Virtual Integration, Blockchain Programming, and Agile/DevOps: The Latest Work from the SEI</title><link>https://www.sei.cmu.edu/blog/virtual-integration-blockchain-programming-and-agiledevops-the-latest-work-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>As part of an ongoing effort to keep you informed about our latest work, this blog post summarizes some recently published SEI reports, podcasts, and presentations highlighting our work in virtual integration, blockchain programming....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 28 May 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/virtual-integration-blockchain-programming-and-agiledevops-the-latest-work-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Blockchain</category><category>Cyber Missions</category><category>Data Modeling and Analytics</category><category>Autonomy and Counter-Autonomy</category></item><item><title>Implications and Mitigation Strategies for the Loss of End-Entity Private Keys</title><link>https://www.sei.cmu.edu/blog/implications-and-mitigation-strategies-for-the-loss-of-end-entity-private-keys/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>When a private key in a public-key infrastructure (PKI) environment is lost or stolen, compromised end-entity certificates can be used to impersonate a principal that is associated with it....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aaron Reffett, Tom Scanlon</dc:creator><pubDate>Mon, 19 Mar 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/implications-and-mitigation-strategies-for-the-loss-of-end-entity-private-keys/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Autonomy and Counter-Autonomy</category><category>Software and Information Assurance</category><category>Best Practices in Network Security</category></item><item><title>Bitcoin, Blockchain, Machine Learning, and Ransomware: The Top 10 Posts of 2017</title><link>https://www.sei.cmu.edu/blog/bitcoin-blockchain-machine-learning-and-ransomware-the-top-10-posts-of-2017/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Each year since the blog's inception, we present the 10 most-visited posts of the year in descending order ending with the most popular post. In this blog post, we present the 10 most popular posts published between January 1, 2017 and December 31, 2017.10....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 08 Jan 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/bitcoin-blockchain-machine-learning-and-ransomware-the-top-10-posts-of-2017/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Blockchain</category><category>Autonomy and Counter-Autonomy</category><category>Cyber Missions</category><category>System Verification and Validation</category><category>Best Practices in Network Security</category><category>Mission Assurance</category></item><item><title>Inference of Memory Bounds: Preventing the Next Heartbleed</title><link>https://www.sei.cmu.edu/blog/inference-of-memory-bounds-preventing-the-next-heartbleed/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Learn about research aimed at detecting intended memory bounds of given pointers, helping to prevent vulnerabilities like HeartBleed in this SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Klieber</dc:creator><pubDate>Mon, 04 Dec 2017 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/inference-of-memory-bounds-preventing-the-next-heartbleed/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Secure Development</category><category>Secure Coding</category><category>Autonomy and Counter-Autonomy</category></item><item><title>8 At-Risk Emerging Technologies</title><link>https://www.sei.cmu.edu/blog/8-at-risk-emerging-technologies/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Identifying 8 emerging technologies at risk for security vulnerabilities, this SEI Blog post covers autonomous systems, AI, 5G networks and more.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dan Klinedinst</dc:creator><pubDate>Mon, 23 Oct 2017 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/8-at-risk-emerging-technologies/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Autonomy and Counter-Autonomy</category><category>Blockchain</category></item><item><title>Supply Chain Risk Management, Network Situational Awareness, Software Architecture, and Network Time Protocol: The Latest Work from the SEI</title><link>https://www.sei.cmu.edu/blog/supply-chain-risk-management-network-situational-awareness-software-architecture-and-network-time-protocol-the-latest-work-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post highlights the latest research on supply chain risk management, network situational awareness, software architecture, and network time protocol.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 03 Jul 2017 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/supply-chain-risk-management-network-situational-awareness-software-architecture-and-network-time-protocol-the-latest-work-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Autonomy and Counter-Autonomy</category><category>Software and Information Assurance</category><category>Cyber Missions</category><category>Mission Assurance</category></item><item><title>Army Robotics in the Military</title><link>https://www.sei.cmu.edu/blog/army-robotics-in-the-military/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Discover how SEI researchers created an innovative environment within ROS-M to develop unmanned systems quickly in this SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jonathan Chu</dc:creator><pubDate>Mon, 12 Jun 2017 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/army-robotics-in-the-military/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Autonomy and Counter-Autonomy</category><category>Robotics</category></item><item><title>Prioritizing Security Alerts: A DoD Case Study</title><link>https://www.sei.cmu.edu/blog/prioritizing-security-alerts-a-dod-case-study/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Detailing collaboration with the DoD, the second post in this SEI series highlights field testing of the organization's analysis of 100M lines of code.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Lori Flynn</dc:creator><pubDate>Mon, 23 Jan 2017 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/prioritizing-security-alerts-a-dod-case-study/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Secure Coding</category><category>Autonomy and Counter-Autonomy</category><category>Software and Information Assurance</category><category>Static Analysis Classification and Prioritization</category><category>Secure Development</category></item><item><title>Automated Code Repair in the C Programming Language</title><link>https://www.sei.cmu.edu/blog/automated-code-repair-in-the-c-programming-language/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post describes research on automated code repair for faster, cheaper elimination of security vulnerabilities in C and other programming languages.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Klieber</dc:creator><pubDate>Mon, 16 Jan 2017 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/automated-code-repair-in-the-c-programming-language/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Secure Development</category><category>Secure Coding</category><category>Autonomy and Counter-Autonomy</category></item><item><title>Autonomy, Robotics, Verification, DDoS Attacks, and Software Testing: The Top 10 Posts of 2016</title><link>https://www.sei.cmu.edu/blog/autonomy-robotics-verification-ddos-attacks-and-software-testing-the-top-10-posts-of-2016/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Discover the top 10 most-visited SEI Blog posts in 2016.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 19 Dec 2016 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/autonomy-robotics-verification-ddos-attacks-and-software-testing-the-top-10-posts-of-2016/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Autonomy and Counter-Autonomy</category></item><item><title>Why Did the Robot Do That?</title><link>https://www.sei.cmu.edu/blog/why-did-the-robot-do-that/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In this blog post, I describe research that aims to help robots explain their behaviors in plain English and offer greater insights into their decision making.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Stephanie Rosenthal</dc:creator><pubDate>Mon, 05 Dec 2016 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/why-did-the-robot-do-that/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Robotics</category><category>Autonomy and Counter-Autonomy</category></item><item><title>Verifying Distributed Adaptive Real-Time Systems</title><link>https://www.sei.cmu.edu/blog/verifying-distributed-adaptive-real-time-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post explores high-assurance software in DART systems, and outlines the SEI's approach to meet safety requirements in dynamic environments.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">James Edmondson, Sagar Chaki</dc:creator><pubDate>Mon, 10 Oct 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/verifying-distributed-adaptive-real-time-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Assurance</category><category>Artificial Intelligence Engineering</category><category>Model Checking</category><category>Verification</category><category>Autonomy and Counter-Autonomy</category><category>Real-Time Scheduling</category><category>Artificial Intelligence</category><category>Cyber-Physical Systems</category></item><item><title>Prioritizing Alerts from Static Analysis to Find and Fix Code Flaws</title><link>https://www.sei.cmu.edu/blog/prioritizing-alerts-from-static-analysis-to-find-and-fix-code-flaws/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post explores the importance of prioritizing alerts from static analysis tools to effectively identify and fix code flaws in software development.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Lori Flynn</dc:creator><pubDate>Mon, 06 Jun 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/prioritizing-alerts-from-static-analysis-to-find-and-fix-code-flaws/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Secure Coding</category><category>Autonomy and Counter-Autonomy</category><category>Software and Information Assurance</category><category>Static Analysis Classification and Prioritization</category><category>Secure Development</category></item></channel></rss>