Digital Library

The SEI publishes extensively to connect with and deliver our most recent advancements in software engineering, cyber, artificial intelligence, and acquisition transformation to the software community. We publish our research in elite journals, and we also produce technical reports, white papers, webcasts, and much more—all of which we make available in our digital library. We’ve collected thousands of publications over decades of research that you can download today.

Search the digital library

Get our latest innovations in your inbox

Subscribe to SEI Bulletin

or follow us on social media

Technical Papers

Blog Posts

Data Poisoning in AI Models: The Case for Chain of Custody Controls

This post explores data poisoning, which occurs when training data is modified to influence the performance of a model, and proposes cryptographic chain of custody …

Using Data and Data Analytics to Improve Cyber Resilience

Our post highlights the use of data analytics as a force multiplier for cyber resilience as well as best practices to help organizations gain situational …

From Reality to Virtual Reality: The Impact of 3DGS on Training, Education, and Beyond

This blog post describes cutting-edge method for creating digital models of the physical world called 3D Gaussian Splatting.

Assessing the Feasibility and Advisability of a Civilian Cybersecurity Reserve

This post highlights recent work by SEI researchers on behalf of the Department of War to assess the feasibility and advisability of a civilian cybersecurity …

Podcasts

Goal-Line Defense: A Tool to Discover and Mitigate UEFI Vulnerabilities
Goal-Line Defense: A Tool to Discover and Mitigate UEFI Vulnerabilities
This podcast explores CERT UEFI Parser, a new, open source tool that uses program analysis to reveal the architecture of UEFI software, and explore this …
Leadership, Legacy, and the Power of Mentors: Insights from Dr. Paul Nielsen
Leadership, Legacy, and the Power of Mentors: Insights from Dr. Paul Nielsen
Paul Nielsen, the SEI's director and chief executive officer, discusses his legacy, the impact of mentors, and the importance of encouraging scientists and engineers to …
With a Little Help from Our Civilian Friends: Cybersecurity Reserve Is Both Feasible and Advisable
With a Little Help from Our Civilian Friends: Cybersecurity Reserve Is Both Feasible and Advisable
Marie Baker, Chris May, and Mike Winter discuss findings from a Pentagon-commissioned study assessing the feasibility of a civilian cybersecurity reserve.
Maturing AI Adoption: From Chaos to Consistency
Maturing AI Adoption: From Chaos to Consistency
Our latest podcast highlights an AI Adoption Maturity Model that organizations can use to create a roadmap for predictable AI adoption and realization of AI …

Webcasts

Latest webcasts

Ensuring the Safety and Security of AI Systems
Ensuring the Safety and Security of AI Systems
In this webcast, SEI researchers explain how System Theoretic Process Analysis helps organizations build stronger assurances about the safety and security of complex systems, including …
Tools for Building an AI-Enabled SOC
Tools for Building an AI-Enabled SOC
In this webcast, Justin Novak and Christopher Ian Rodman discuss how AI can be leveraged to build out and enable your security operations center (SOC) …
Software Acquisition Go Bag: Cracking the CNS Code
Software Acquisition Go Bag: Cracking the CNS Code
In this webcast, Brigid O’Hearn, Christina Rhylander, and Julie Cohen provide you with the practical insight you need to develop a Capability Needs Statement (CNS) …
Acquisition Oversight for Software Assurance
Acquisition Oversight for Software Assurance
In this webcast, Dr. Carol Woody and Michael Bandor discuss key software assurance activities that must be embedded within the acquisition lifecycle to be effective.

Vulnerability Notes

The SEI builds relationships with software vendors and other organizations to coordinate prompt responses to possible risks or threats that arise from software vulnerabilities. Over the years, we have built an extensive vendor network, and we work as a trusted broker to identify, disclose, and mitigate vulnerabilities. As part of this effort, we publish vulnerability notes to keep the community informed and to enable effective and swift mitigation.