<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Secure Coding</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Secure Coding</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/secure-coding/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 06 Jan 2025 00:00:00 -0500</lastBuildDate><item><title>The Top 10 Blog Posts of 2024</title><link>https://www.sei.cmu.edu/blog/the-top-10-blog-posts-of-2024/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post presents the top 10 most-visited posts of 2024, highlighting our work in software acquisition, artificial intelligence, large language models, secure coding, and more.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Bill Scherlis</dc:creator><pubDate>Mon, 06 Jan 2025 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/the-top-10-blog-posts-of-2024/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Secure Coding</category><category>Insider Threat</category><category>Artificial Intelligence Engineering</category><category>Machine Learning</category><category>AI Engineering and Machine Learning</category><category>Acquisition Transformation</category></item><item><title>Evaluating Static Analysis Alerts with LLMs</title><link>https://www.sei.cmu.edu/blog/evaluating-static-analysis-alerts-with-llms/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>LLMs show promising initial results in adjudicating static analysis alerts, offering possibilities for better vulnerability detection. This post discusses initial experiments using GPT-4 to evaluate static analysis alerts.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Klieber, Lori Flynn</dc:creator><pubDate>Mon, 07 Oct 2024 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/evaluating-static-analysis-alerts-with-llms/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Static Analysis</category><category>AI Engineering and Machine Learning</category><category>Secure Coding</category></item><item><title>Redemption: A Prototype for Automated Repair of Static Analysis Alerts</title><link>https://www.sei.cmu.edu/blog/redemption-a-prototype-for-automated-repair-of-static-analysis-alerts/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post introduces Redemption, an open source tool that uses automated code repair technology to repair static analysis alerts in C/C++ source code.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David Svoboda</dc:creator><pubDate>Mon, 10 Jun 2024 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/redemption-a-prototype-for-automated-repair-of-static-analysis-alerts/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Secure Coding</category><category>Testing</category><category>Static Analysis</category></item><item><title>Release of SCAIFE System Version 2.0.0 Provides Support for Continuous-Integration (CI) Systems</title><link>https://www.sei.cmu.edu/blog/release-of-scaife-system-version-200-provides-support-for-continuous-integration-ci-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Key features in new release of SCAIFE System Version 2.0.0 including support for continuous-integration (CI) systems, and status of evolving SEI SCAIFE work</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Lori Flynn</dc:creator><pubDate>Mon, 25 Oct 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/release-of-scaife-system-version-200-provides-support-for-continuous-integration-ci-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Continuous Deployment of Capability</category><category>SCALE: A Static Analysis Auditing Tool</category><category>Secure Coding</category><category>Machine Learning</category><category>Static Analysis</category><category>Static Analysis Classification and Prioritization</category><category>Secure Development</category><category>Artificial Intelligence</category><category>Source Code Analysis Integrated Framework Environment (SCAIFE)</category></item><item><title>Automated Code Repair to Ensure Memory Safety</title><link>https://www.sei.cmu.edu/blog/automated-code-repair-to-ensure-memory-safety/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Memory-safety vulnerabilities are among the most common and most severe types of software vulnerabilities. In early 2019, a memory vulnerability in the iPhone iOS....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Klieber</dc:creator><pubDate>Mon, 24 Feb 2020 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/automated-code-repair-to-ensure-memory-safety/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Secure Coding</category><category>Secure Development</category></item><item><title>How to Use Static Analysis to Enforce SEI CERT Coding Standards for IoT Applications</title><link>https://www.sei.cmu.edu/blog/how-to-use-static-analysis-to-enforce-sei-cert-coding-standards-for-iot-applications/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The Jeep hack, methods to hack ATMs, and even hacks to a casino's fish tank provide stark evidence of the risks associated with the Internet of Things (IoT)....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David Svoboda</dc:creator><pubDate>Mon, 01 Apr 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/how-to-use-static-analysis-to-enforce-sei-cert-coding-standards-for-iot-applications/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security-Related Requirements</category><category>Secure Coding</category><category>Cyber Risk and Resilience Management</category><category>Static Analysis</category><category>Cybersecurity</category><category>Secure Development</category><category>Cyber Missions</category><category>Best Practices in Network Security</category></item><item><title>Using the SEI CERT Coding Standards to Improve Security of the Internet of Things</title><link>https://www.sei.cmu.edu/blog/using-the-sei-cert-coding-standards-to-improve-security-of-the-internet-of-things/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The Internet of Things (IoT) is insecure. The Jeep hack received a lot of publicity, and there are various ways to hack ATMs, with incidents occurring with increasing regularity....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David Svoboda</dc:creator><pubDate>Mon, 11 Feb 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/using-the-sei-cert-coding-standards-to-improve-security-of-the-internet-of-things/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security-Related Requirements</category><category>Secure Coding</category><category>Secure Development</category><category>Cyber Missions</category><category>Internet of Things</category></item><item><title>SCALe v. 3: Automated Classification and Advanced Prioritization of Static Analysis Alerts</title><link>https://www.sei.cmu.edu/blog/scale-v-3-automated-classification-and-advanced-prioritization-of-static-analysis-alerts/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Static analysis tools analyze code without executing it, to identify potential flaws in source code. These tools produce a large number of alerts with high false-positive rates that an engineer must....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Lori Flynn, Ebonie McNeil</dc:creator><pubDate>Mon, 17 Dec 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/scale-v-3-automated-classification-and-advanced-prioritization-of-static-analysis-alerts/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>SCALE: A Static Analysis Auditing Tool</category><category>Secure Coding</category><category>Static Analysis Classification and Prioritization</category><category>Secure Development</category><category>Cyber Missions</category></item><item><title>SCALe: A Tool for Managing Output from Static Analysis Tools</title><link>https://www.sei.cmu.edu/blog/scale-a-tool-for-managing-output-from-static-analysis-tools/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Experience shows that most software contains code flaws that can lead to vulnerabilities. Static analysis tools used to identify potential vulnerabilities in source code produce....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Lori Flynn</dc:creator><pubDate>Mon, 24 Sep 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/scale-a-tool-for-managing-output-from-static-analysis-tools/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Secure Coding</category><category>Secure Development</category><category>Static Analysis Classification and Prioritization</category><category>Cyber Missions</category><category>SCALE: A Static Analysis Auditing Tool</category></item><item><title>Obsidian: A New, More Secure Programming Language for Blockchain</title><link>https://www.sei.cmu.edu/blog/obsidian-a-new-more-secure-programming-language-for-blockchain/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Billions of dollars in venture capital, industry investments, and government investments are going into the technology known as blockchain....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eliezer Kanal</dc:creator><pubDate>Tue, 04 Sep 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/obsidian-a-new-more-secure-programming-language-for-blockchain/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Secure Coding</category><category>Cybersecurity</category><category>Secure Development</category><category>Human-Machine Interactions</category><category>Advanced Computing</category><category>Blockchain</category></item><item><title>Decision-Making Factors for Selecting Application Security Testing Tools</title><link>https://www.sei.cmu.edu/blog/decision-making-factors-for-selecting-application-security-testing-tools/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In the first post in this series, I presented 10 types of application security testing (AST) tools and discussed when and how to use them....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tom Scanlon</dc:creator><pubDate>Mon, 20 Aug 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/decision-making-factors-for-selecting-application-security-testing-tools/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Missions</category><category>Cybersecurity</category><category>Secure Coding</category><category>Security-Related Requirements</category><category>Software and Information Assurance</category><category>Testing</category><category>Vulnerability Analysis</category><category>Secure Development</category></item><item><title>IPv6 Adoption: 4 Questions and Answers</title><link>https://www.sei.cmu.edu/blog/ipv6-adoption-4-questions-and-answers/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>IPv6 deployment is on the rise. Google reported that as of July 14 2018, 23.94 percent of users accessed its site via IPv6, up 6.16 percent from that same date in 2017....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Joseph Mayes</dc:creator><pubDate>Mon, 13 Aug 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/ipv6-adoption-4-questions-and-answers/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Best Practices in Network Security</category><category>Cyber Missions</category><category>Secure Coding</category><category>Security-Related Requirements</category><category>IPV6</category><category>Secure Development</category></item><item><title>Test Suites as a Source of Training Data for Static Analysis Alert Classifiers</title><link>https://www.sei.cmu.edu/blog/test-suites-as-a-source-of-training-data-for-static-analysis-alert-classifiers/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Numerous tools exists to help detect flaws in code. Some of these are called flaw-finding static analysis (FFSA) tools because they identify flaws by analyzing code without running it....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Lori Flynn, Zachary Kurtz</dc:creator><pubDate>Mon, 30 Apr 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/test-suites-as-a-source-of-training-data-for-static-analysis-alert-classifiers/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software and Information Assurance</category><category>Static Analysis Classification and Prioritization</category><category>Secure Development</category><category>Secure Coding</category></item><item><title>Inference of Memory Bounds: Preventing the Next Heartbleed</title><link>https://www.sei.cmu.edu/blog/inference-of-memory-bounds-preventing-the-next-heartbleed/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Learn about research aimed at detecting intended memory bounds of given pointers, helping to prevent vulnerabilities like HeartBleed in this SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Klieber</dc:creator><pubDate>Mon, 04 Dec 2017 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/inference-of-memory-bounds-preventing-the-next-heartbleed/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Secure Development</category><category>Secure Coding</category><category>Autonomy and Counter-Autonomy</category></item><item><title>CERT C++ Secure Coding Guidelines</title><link>https://www.sei.cmu.edu/blog/cert-c-secure-coding-guidelines/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post highlights distinctive rules from the SEI CERT C++ Coding Standard, a freely downloadable guide for secure C++ coding practices.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David Svoboda</dc:creator><pubDate>Mon, 17 Apr 2017 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/cert-c-secure-coding-guidelines/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software and Information Assurance</category><category>Secure Development</category><category>Secure Coding</category></item><item><title>Prioritizing Security Alerts: A DoD Case Study</title><link>https://www.sei.cmu.edu/blog/prioritizing-security-alerts-a-dod-case-study/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Detailing collaboration with the DoD, the second post in this SEI series highlights field testing of the organization's analysis of 100M lines of code.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Lori Flynn</dc:creator><pubDate>Mon, 23 Jan 2017 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/prioritizing-security-alerts-a-dod-case-study/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Secure Coding</category><category>Autonomy and Counter-Autonomy</category><category>Software and Information Assurance</category><category>Static Analysis Classification and Prioritization</category><category>Secure Development</category></item><item><title>Automated Code Repair in the C Programming Language</title><link>https://www.sei.cmu.edu/blog/automated-code-repair-in-the-c-programming-language/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post describes research on automated code repair for faster, cheaper elimination of security vulnerabilities in C and other programming languages.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Klieber</dc:creator><pubDate>Mon, 16 Jan 2017 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/automated-code-repair-in-the-c-programming-language/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Secure Development</category><category>Secure Coding</category><category>Autonomy and Counter-Autonomy</category></item><item><title>Resilience, Secure Coding, Data Science, Insider Threat, and Scheduling: The Latest Research from the SEI</title><link>https://www.sei.cmu.edu/blog/resilience-secure-coding-data-science-insider-threat-and-scheduling-the-latest-research-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Discover the SEI's recently released publications on resilience, effective cyber workforce development, secure coding, data science, and insider threat.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 17 Oct 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/resilience-secure-coding-data-science-insider-threat-and-scheduling-the-latest-research-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Secure Coding</category><category>Secure Development</category></item><item><title>Secure Coding in C++11 and C++14</title><link>https://www.sei.cmu.edu/blog/secure-coding-in-c11-and-c14/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI blog post advises on avoiding deprecated functions in C++11 and C++14 to prevent vulnerabilities, and provides guidance on identification and replacement.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aaron Ballman</dc:creator><pubDate>Mon, 26 Sep 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/secure-coding-in-c11-and-c14/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Secure Development</category><category>Secure Coding</category></item><item><title>Prioritizing Alerts from Static Analysis to Find and Fix Code Flaws</title><link>https://www.sei.cmu.edu/blog/prioritizing-alerts-from-static-analysis-to-find-and-fix-code-flaws/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post explores the importance of prioritizing alerts from static analysis tools to effectively identify and fix code flaws in software development.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Lori Flynn</dc:creator><pubDate>Mon, 06 Jun 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/prioritizing-alerts-from-static-analysis-to-find-and-fix-code-flaws/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Secure Coding</category><category>Autonomy and Counter-Autonomy</category><category>Software and Information Assurance</category><category>Static Analysis Classification and Prioritization</category><category>Secure Development</category></item></channel></rss>