<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Static Analysis Classification and Prioritization</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Static Analysis Classification and Prioritization</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/static-analysis-classification-and-prioritization/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 25 Oct 2021 00:00:00 -0400</lastBuildDate><item><title>Release of SCAIFE System Version 2.0.0 Provides Support for Continuous-Integration (CI) Systems</title><link>https://www.sei.cmu.edu/blog/release-of-scaife-system-version-200-provides-support-for-continuous-integration-ci-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Key features in new release of SCAIFE System Version 2.0.0 including support for continuous-integration (CI) systems, and status of evolving SEI SCAIFE work</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Lori Flynn</dc:creator><pubDate>Mon, 25 Oct 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/release-of-scaife-system-version-200-provides-support-for-continuous-integration-ci-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Continuous Deployment of Capability</category><category>SCALE: A Static Analysis Auditing Tool</category><category>Secure Coding</category><category>Machine Learning</category><category>Static Analysis</category><category>Static Analysis Classification and Prioritization</category><category>Secure Development</category><category>Artificial Intelligence</category><category>Source Code Analysis Integrated Framework Environment (SCAIFE)</category></item><item><title>Benefits and Challenges of SOAR Platforms</title><link>https://www.sei.cmu.edu/blog/benefits-and-challenges-of-soar-platforms/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Explore Security Orchestration, Automation, and Response (SOAR) platforms for improved incident response in this SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Angela Horneman, Justin Ray</dc:creator><pubDate>Mon, 01 Mar 2021 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/benefits-and-challenges-of-soar-platforms/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Static Analysis Classification and Prioritization</category></item><item><title>Release of SCAIFE System Version 1.0.0 Provides Full GUI-Based Static-Analysis Adjudication System with Meta-Alert Classification</title><link>https://www.sei.cmu.edu/blog/release-scaife-system-version-100-provides-full-gui-based-static-analysis-adjudication-system-meta-alert-classification/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The SEI Source Code Analysis Integrated Framework Environment (SCAIFE) is a modular architecture designed to enable a wide variety of tools, systems, and users to use artificial intelligence (AI) classifiers for static-analysis meta-alerts at relatively low cost and effort.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Lori Flynn</dc:creator><pubDate>Mon, 14 Dec 2020 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/release-scaife-system-version-100-provides-full-gui-based-static-analysis-adjudication-system-meta-alert-classification/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Source Code Analysis Integrated Framework Environment (SCAIFE)</category><category>Static Analysis Classification and Prioritization</category><category>SCALE: A Static Analysis Auditing Tool</category></item><item><title>A Public Repository of Data for Static-Analysis Classification Research</title><link>https://www.sei.cmu.edu/blog/public-repository-data-static-analysis-classification-research/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post describes a new repository of labeled data that CERT is making publicly available for many code-flaw conditions. Researchers can use this dataset along with the associated code and tool output to monitor and test the performance of their automated classification of meta-alerts.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Lori Flynn</dc:creator><pubDate>Mon, 02 Nov 2020 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/public-repository-data-static-analysis-classification-research/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Static Analysis Classification and Prioritization</category><category>SCALE: A Static Analysis Auditing Tool</category><category>Source Code Analysis Integrated Framework Environment (SCAIFE)</category></item><item><title>Managing Static Analysis Alerts with Efficient Instantiation of the SCAIFE API into Code and an Automatically Classifying System</title><link>https://www.sei.cmu.edu/blog/managing-static-analysis-alerts-with-efficient-instantiation-of-the-scaife-api-into-code-and-an-automatically-classifying-system/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Learn how the SEI's SCAIFE API helps classify and prioritize static analysis alerts, reduce manual effort, and improve accuracy in identifying code flaws.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Lori Flynn</dc:creator><pubDate>Mon, 14 Sep 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/managing-static-analysis-alerts-with-efficient-instantiation-of-the-scaife-api-into-code-and-an-automatically-classifying-system/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Static Analysis Classification and Prioritization</category><category>SCALE: A Static Analysis Auditing Tool</category></item><item><title>Data-Driven Management of Technical Debt</title><link>https://www.sei.cmu.edu/blog/data-driven-management-of-technical-debt/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Learn about the SEI's work on technical debt analysis techniques and practices to help software engineers manage its impact on projects in this SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ipek Ozkaya, Robert Nord</dc:creator><pubDate>Mon, 16 Dec 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/data-driven-management-of-technical-debt/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Assurance</category><category>Software Sustainment</category><category>Machine Learning</category><category>Software and Information Assurance</category><category>Static Analysis Classification and Prioritization</category><category>Artificial Intelligence</category><category>Software Architecture</category><category>Technical Debt</category><category>Software Quality</category></item><item><title>An Application Programming Interface for Classifying and Prioritizing Static Analysis Alerts</title><link>https://www.sei.cmu.edu/blog/an-application-programming-interface-for-classifying-and-prioritizing-static-analysis-alerts/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In this post, we describe the Source Code Analysis Integrated Framework Environment (SCAIFE) application programming interface (API). SCAIFE is an architecture for classifying and prioritizing static analysis alerts.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Lori Flynn, Ebonie McNeil</dc:creator><pubDate>Mon, 22 Jul 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/an-application-programming-interface-for-classifying-and-prioritizing-static-analysis-alerts/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Static Analysis Classification and Prioritization</category><category>SCALE: A Static Analysis Auditing Tool</category></item><item><title>SCALe v. 3: Automated Classification and Advanced Prioritization of Static Analysis Alerts</title><link>https://www.sei.cmu.edu/blog/scale-v-3-automated-classification-and-advanced-prioritization-of-static-analysis-alerts/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Static analysis tools analyze code without executing it, to identify potential flaws in source code. These tools produce a large number of alerts with high false-positive rates that an engineer must....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Lori Flynn, Ebonie McNeil</dc:creator><pubDate>Mon, 17 Dec 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/scale-v-3-automated-classification-and-advanced-prioritization-of-static-analysis-alerts/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>SCALE: A Static Analysis Auditing Tool</category><category>Secure Coding</category><category>Static Analysis Classification and Prioritization</category><category>Secure Development</category><category>Cyber Missions</category></item><item><title>SCALe: A Tool for Managing Output from Static Analysis Tools</title><link>https://www.sei.cmu.edu/blog/scale-a-tool-for-managing-output-from-static-analysis-tools/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Experience shows that most software contains code flaws that can lead to vulnerabilities. Static analysis tools used to identify potential vulnerabilities in source code produce....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Lori Flynn</dc:creator><pubDate>Mon, 24 Sep 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/scale-a-tool-for-managing-output-from-static-analysis-tools/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Secure Coding</category><category>Secure Development</category><category>Static Analysis Classification and Prioritization</category><category>Cyber Missions</category><category>SCALE: A Static Analysis Auditing Tool</category></item><item><title>Test Suites as a Source of Training Data for Static Analysis Alert Classifiers</title><link>https://www.sei.cmu.edu/blog/test-suites-as-a-source-of-training-data-for-static-analysis-alert-classifiers/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Numerous tools exists to help detect flaws in code. Some of these are called flaw-finding static analysis (FFSA) tools because they identify flaws by analyzing code without running it....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Lori Flynn, Zachary Kurtz</dc:creator><pubDate>Mon, 30 Apr 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/test-suites-as-a-source-of-training-data-for-static-analysis-alert-classifiers/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software and Information Assurance</category><category>Static Analysis Classification and Prioritization</category><category>Secure Development</category><category>Secure Coding</category></item><item><title>Prioritizing Security Alerts: A DoD Case Study</title><link>https://www.sei.cmu.edu/blog/prioritizing-security-alerts-a-dod-case-study/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Detailing collaboration with the DoD, the second post in this SEI series highlights field testing of the organization's analysis of 100M lines of code.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Lori Flynn</dc:creator><pubDate>Mon, 23 Jan 2017 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/prioritizing-security-alerts-a-dod-case-study/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Secure Coding</category><category>Autonomy and Counter-Autonomy</category><category>Software and Information Assurance</category><category>Static Analysis Classification and Prioritization</category><category>Secure Development</category></item><item><title>Prioritizing Alerts from Static Analysis to Find and Fix Code Flaws</title><link>https://www.sei.cmu.edu/blog/prioritizing-alerts-from-static-analysis-to-find-and-fix-code-flaws/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post explores the importance of prioritizing alerts from static analysis tools to effectively identify and fix code flaws in software development.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Lori Flynn</dc:creator><pubDate>Mon, 06 Jun 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/prioritizing-alerts-from-static-analysis-to-find-and-fix-code-flaws/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Secure Coding</category><category>Autonomy and Counter-Autonomy</category><category>Software and Information Assurance</category><category>Static Analysis Classification and Prioritization</category><category>Secure Development</category></item></channel></rss>