<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>SEI Blog | Secure Development</title><link href="http://sei.cmu.edu/feeds/topic/secure-development/atom/?utm_source=blog&amp;utm_medium=rss" rel="alternate"/><link href="http://sei.cmu.edu/feeds/topic/secure-development/atom/?utm_source=blog&amp;utm_medium=rss" rel="self"/><id>http://sei.cmu.edu/feeds/topic/secure-development/atom/?utm_source=blog&amp;utm_medium=rss</id><updated>2026-03-04T00:00:00-05:00</updated><subtitle>Updates on changes and additions to the                         SEI Blog for posts matching Secure Development</subtitle><entry><title>The Five Pillars of Software Assurance in System Acquisition</title><link href="https://www.sei.cmu.edu/blog/the-five-pillars-of-software-assurance-in-system-acquisition/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2026-03-04T00:00:00-05:00</published><updated>2026-03-04T00:00:00-05:00</updated><author><name>Dr. Carol Woody, Christopher Alberts, Michael Bandor, Timothy A. Chick</name></author><id>https://www.sei.cmu.edu/blog/the-five-pillars-of-software-assurance-in-system-acquisition/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post presents five foundational capabilities to support the acquisition of a system with effective software assurance.</summary></entry><entry><title>Tailoring 9 Zero Trust and Security Principles to Weapon Systems</title><link href="https://www.sei.cmu.edu/blog/tailoring-9-zero-trust-and-security-principles-to-weapon-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-12-09T00:00:00-05:00</published><updated>2025-12-09T00:00:00-05:00</updated><author><name>Christopher Alberts, Timothy Morrow, Rhonda Brown, Charles Wallen</name></author><id>https://www.sei.cmu.edu/blog/tailoring-9-zero-trust-and-security-principles-to-weapon-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Our latest post outlines how 9 zero trust and security principles might apply to weapon systems.</summary></entry><entry><title>AI-Powered Memory Safety with the Pointer Ownership Model</title><link href="https://www.sei.cmu.edu/blog/ai-powered-memory-safety-with-the-pointer-ownership-model/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-12-03T00:00:00-05:00</published><updated>2025-12-03T00:00:00-05:00</updated><author><name>David Svoboda, Lori Flynn</name></author><id>https://www.sei.cmu.edu/blog/ai-powered-memory-safety-with-the-pointer-ownership-model/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post highlights work to automate C Code Security with AI-Powered memory safety.</summary></entry><entry><title>Managing Security and Resilience Risks Across the  Lifecycle</title><link href="https://www.sei.cmu.edu/blog/managing-security-and-resilience-risks-across-the-lifecycle/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-07-23T00:00:00-04:00</published><updated>2025-07-23T00:00:00-04:00</updated><author><name>Christopher Alberts, Charles Wallen, Dr. Carol Woody, Michael Bandor</name></author><id>https://www.sei.cmu.edu/blog/managing-security-and-resilience-risks-across-the-lifecycle/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post introduces the Security Engineering Framework, a schema of software-focused engineering practices that acquisition programs can use to manage security and resilience risks across the lifecycle.</summary></entry><entry><title>Detection and Repair: The Cost of Remediation</title><link href="https://www.sei.cmu.edu/blog/detection-and-repair-the-cost-of-remediation/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-03-03T00:00:00-05:00</published><updated>2025-03-03T00:00:00-05:00</updated><author><name>David Svoboda</name></author><id>https://www.sei.cmu.edu/blog/detection-and-repair-the-cost-of-remediation/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This year, we plan on making some exciting updates to the SEI CERT C Coding Standard. This blog post is about one of our ideas for improving the standard.</summary></entry><entry><title>Measurement Challenges in  Software Assurance and Supply Chain Risk Management</title><link href="https://www.sei.cmu.edu/blog/measurement-challenges-in-software-assurance-and-supply-chain-risk-management/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2024-05-20T00:00:00-04:00</published><updated>2024-05-20T00:00:00-04:00</updated><author><name>Nancy Mead, Dr. Carol Woody, Scott Hissam</name></author><id>https://www.sei.cmu.edu/blog/measurement-challenges-in-software-assurance-and-supply-chain-risk-management/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This SEI Blog post examines the current state of measurement in software assurance and supply chain management, with a particular focus on open source software, and highlights promising measurement approaches.</summary><category term="Supply Chain Assurance"/></entry><entry><title>What Recent Vulnerabilities Mean to Rust</title><link href="https://www.sei.cmu.edu/blog/what-recent-vulnerabilities-mean-to-rust/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2024-04-29T00:00:00-04:00</published><updated>2024-04-29T00:00:00-04:00</updated><author><name>David Svoboda</name></author><id>https://www.sei.cmu.edu/blog/what-recent-vulnerabilities-mean-to-rust/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">In recent weeks several vulnerabilities have rocked the Rust community causing many to question its safety. This post examines two such vulnerabilities.</summary><category term="Rust"/></entry><entry><title>The SEI SBOM Framework: Informing Third-Party Software Management in Your Supply Chain</title><link href="https://www.sei.cmu.edu/blog/the-sei-sbom-framework-informing-third-party-software-management-in-your-supply-chain/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-11-06T00:00:00-05:00</published><updated>2023-11-06T00:00:00-05:00</updated><author><name>Christopher Alberts, Michael Bandor, Charles Wallen, Dr. Carol Woody</name></author><id>https://www.sei.cmu.edu/blog/the-sei-sbom-framework-informing-third-party-software-management-in-your-supply-chain/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post presents a framework to promote the use of SBOMs and establish practices and processes that organizations can leverage as they build their programs.</summary><category term="Supply Chain Assurance"/><category term="Acquisition Transformation"/></entry><entry><title>Rust Vulnerability Analysis and Maturity Challenges</title><link href="https://www.sei.cmu.edu/blog/rust-vulnerability-analysis-and-maturity-challenges/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-01-23T00:00:00-05:00</published><updated>2023-01-23T00:00:00-05:00</updated><author><name>Garret Wassermann, David Svoboda</name></author><id>https://www.sei.cmu.edu/blog/rust-vulnerability-analysis-and-maturity-challenges/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post explores tools for understanding vulnerabilities in the Rust programming language as well as the maturity of the Rust software ecosystem as a whole and how that might impact future security responses.</summary><category term="Rust"/></entry><entry><title>Rust Software Security: A Current State Assessment</title><link href="https://www.sei.cmu.edu/blog/rust-software-security-a-current-state-assessment/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2022-12-12T00:00:00-05:00</published><updated>2022-12-12T00:00:00-05:00</updated><author><name>Joe Sible, David Svoboda</name></author><id>https://www.sei.cmu.edu/blog/rust-software-security-a-current-state-assessment/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post examines security issues with the Rust programming language.</summary><category term="Rust"/></entry><entry><title>Taking Up the Challenge of Open Source Software Security in the DoD</title><link href="https://www.sei.cmu.edu/blog/taking-up-the-challenge-of-open-source-software-security-in-the-dod/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2022-08-15T00:00:00-04:00</published><updated>2022-08-15T00:00:00-04:00</updated><author><name>Scott Hissam</name></author><id>https://www.sei.cmu.edu/blog/taking-up-the-challenge-of-open-source-software-security-in-the-dod/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post describes a workshop hosted by the SEI to start a conversation to elevate the trustworthiness of free and open source software, particularly in DoD settings.</summary><category term="Software Assurance"/><category term="Supply Chains"/></entry><entry><title>11 Leading Practices When Implementing a Container Strategy</title><link href="https://www.sei.cmu.edu/blog/11-leading-practices-when-implementing-a-container-strategy/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-11-08T00:00:00-05:00</published><updated>2021-11-08T00:00:00-05:00</updated><author><name>Andrew Mellinger, William Nichols, Jay Palat</name></author><id>https://www.sei.cmu.edu/blog/11-leading-practices-when-implementing-a-container-strategy/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">While containers are frequently lauded in the latest software development trends, switching from using virtual machines and deploying an organization-wide container strategy remains non-trivial.</summary></entry><entry><title>Release of SCAIFE System Version 2.0.0 Provides Support for Continuous-Integration (CI) Systems</title><link href="https://www.sei.cmu.edu/blog/release-of-scaife-system-version-200-provides-support-for-continuous-integration-ci-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-10-25T00:00:00-04:00</published><updated>2021-10-25T00:00:00-04:00</updated><author><name>Lori Flynn</name></author><id>https://www.sei.cmu.edu/blog/release-of-scaife-system-version-200-provides-support-for-continuous-integration-ci-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Key features in new release of SCAIFE System Version 2.0.0 including support for continuous-integration (CI) systems, and status of evolving SEI SCAIFE work</summary><category term="Continuous Deployment of Capability"/><category term="SCALE: A Static Analysis Auditing Tool"/><category term="Secure Coding"/><category term="Machine Learning"/><category term="Static Analysis"/><category term="Static Analysis Classification and Prioritization"/><category term="Secure Development"/><category term="Artificial Intelligence"/><category term="Source Code Analysis Integrated Framework Environment (SCAIFE)"/></entry><entry><title>A Technique for Decompiling Binary Code for Software Assurance and Localized Repair</title><link href="https://www.sei.cmu.edu/blog/a-technique-for-decompiling-binary-code-for-software-assurance-and-localized-repair/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-10-11T00:00:00-04:00</published><updated>2021-10-11T00:00:00-04:00</updated><author><name>William Klieber</name></author><id>https://www.sei.cmu.edu/blog/a-technique-for-decompiling-binary-code-for-software-assurance-and-localized-repair/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">The DoD has a significant amount of software available only in binary form. It is impractical to ensure that this software is free from vulnerabilities and malicious code.</summary></entry><entry><title>Anti-Tamper for Software Components</title><link href="https://www.sei.cmu.edu/blog/anti-tamper-for-software-components/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-06-21T00:00:00-04:00</published><updated>2021-06-21T00:00:00-04:00</updated><author><name>Scott Hissam</name></author><id>https://www.sei.cmu.edu/blog/anti-tamper-for-software-components/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post explains how to identify software components within systems that are in danger of being exploited and that should be protected by anti-tamper practices.</summary><category term="Software Assurance"/><category term="System Resilience"/><category term="Cyber Risk and Resilience Management"/><category term="Supply Chains"/></entry><entry><title>A Public Repository of Data for Static-Analysis Classification Research</title><link href="https://www.sei.cmu.edu/blog/public-repository-data-static-analysis-classification-research/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-11-02T00:00:00-05:00</published><updated>2020-11-02T00:00:00-05:00</updated><author><name>Lori Flynn</name></author><id>https://www.sei.cmu.edu/blog/public-repository-data-static-analysis-classification-research/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This blog post describes a new repository of labeled data that CERT is making publicly available for many code-flaw conditions. Researchers can use this dataset along with the associated code and tool output to monitor and test the performance of their automated classification of meta-alerts.</summary><category term="Static Analysis Classification and Prioritization"/><category term="SCALE: A Static Analysis Auditing Tool"/><category term="Source Code Analysis Integrated Framework Environment (SCAIFE)"/></entry><entry><title>Automated Code Repair to Ensure Memory Safety</title><link href="https://www.sei.cmu.edu/blog/automated-code-repair-to-ensure-memory-safety/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-02-24T00:00:00-05:00</published><updated>2020-02-24T00:00:00-05:00</updated><author><name>William Klieber</name></author><id>https://www.sei.cmu.edu/blog/automated-code-repair-to-ensure-memory-safety/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Memory-safety vulnerabilities are among the most common and most severe types of software vulnerabilities. In early 2019, a memory vulnerability in the iPhone iOS....</summary><category term="Secure Coding"/><category term="Secure Development"/></entry><entry><title>An Application Programming Interface for Classifying and Prioritizing Static Analysis Alerts</title><link href="https://www.sei.cmu.edu/blog/an-application-programming-interface-for-classifying-and-prioritizing-static-analysis-alerts/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2019-07-22T00:00:00-04:00</published><updated>2019-07-22T00:00:00-04:00</updated><author><name>Lori Flynn, Ebonie McNeil</name></author><id>https://www.sei.cmu.edu/blog/an-application-programming-interface-for-classifying-and-prioritizing-static-analysis-alerts/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">In this post, we describe the Source Code Analysis Integrated Framework Environment (SCAIFE) application programming interface (API). SCAIFE is an architecture for classifying and prioritizing static analysis alerts.</summary><category term="Static Analysis Classification and Prioritization"/><category term="SCALE: A Static Analysis Auditing Tool"/></entry><entry><title>How to Use Static Analysis to Enforce SEI CERT Coding Standards for IoT Applications</title><link href="https://www.sei.cmu.edu/blog/how-to-use-static-analysis-to-enforce-sei-cert-coding-standards-for-iot-applications/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2019-04-01T00:00:00-04:00</published><updated>2019-04-01T00:00:00-04:00</updated><author><name>David Svoboda</name></author><id>https://www.sei.cmu.edu/blog/how-to-use-static-analysis-to-enforce-sei-cert-coding-standards-for-iot-applications/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">The Jeep hack, methods to hack ATMs, and even hacks to a casino's fish tank provide stark evidence of the risks associated with the Internet of Things (IoT)....</summary><category term="Security-Related Requirements"/><category term="Secure Coding"/><category term="Cyber Risk and Resilience Management"/><category term="Static Analysis"/><category term="Cybersecurity"/><category term="Secure Development"/><category term="Cyber Missions"/><category term="Best Practices in Network Security"/></entry><entry><title>Using the SEI CERT Coding Standards to Improve Security of the Internet of Things</title><link href="https://www.sei.cmu.edu/blog/using-the-sei-cert-coding-standards-to-improve-security-of-the-internet-of-things/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2019-02-11T00:00:00-05:00</published><updated>2019-02-11T00:00:00-05:00</updated><author><name>David Svoboda</name></author><id>https://www.sei.cmu.edu/blog/using-the-sei-cert-coding-standards-to-improve-security-of-the-internet-of-things/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">The Internet of Things (IoT) is insecure. The Jeep hack received a lot of publicity, and there are various ways to hack ATMs, with incidents occurring with increasing regularity....</summary><category term="Security-Related Requirements"/><category term="Secure Coding"/><category term="Secure Development"/><category term="Cyber Missions"/><category term="Internet of Things"/></entry></feed>