Technical Papers
The SEI Digital Library houses thousands of technical papers and other documents, ranging from SEI Technical Reports on groundbreaking research to conference proceedings, survey results, and source code.
Filter by
-
Key Takeaways from Zero Trust Industry Day 2024
• White Paper
By Patsy Bulisco
This paper describes key takeaways from Zero Trust Industry Day 2024.
DOWNLOAD -
AI Hygiene Starts with Models and Data Loaders
• White Paper
By Matt Churilla, Mahmoud Shabana, Shing-hon Lau, Renae Metcalf
This paper places a call to action for traditional cybersecurity tools and techniques to be applied to artificial intelligence (AI) for improving the cybersecurity of AI systems.
DOWNLOAD -
Security Engineering Framework (SEF): Managing Security and Resilience Risks Across the Systems Lifecycle
• Special Report
By Michael S. Bandor, Charles M. Wallen, Christopher J. Alberts, Tom Merendino, Carol Woody
The SEF is a collection of software-focused engineering practices for managing security and resilience risks across the systems lifecycle.
DOWNLOAD -
Dangers of AI for Insider Risk Evaluation (DARE)
• White Paper
By Austin Whisnant
This paper describes the challenges and pitfalls of using artificial intelligence for insider risk analysis and how to thoughtfully and efficiently use AI to find insider threats.
DOWNLOAD -
Assurance Evidence of Continuously Evolving Real-Time Systems (ASERT) Workshop 2024
• Special Report
By Daniel Shapiro (Institute of Defense Analysis), Dionisio de Niz, Bjorn Andersson, Mark H. Klein, Hyoseung Kim (University of California, Riverside), John Lehoczky (Carnegie Mellon University), George Romanski (Federal Aviation Administration), Jonathan Preston (Lockheed Martin Corporation), Floyd Fazi (Lockheed Martin Corporation), Ronald Koontz (Boeing Company)
This report summarizes the analysis of the Taiwanese flight CI202 incident from 2020 as well as ideas for future work for ASERT presented at its 2024 workshop.
DOWNLOAD -
Self-Assessment in Training and Exercise
• Technical Report
By John Yarger, Thomas G. Podnar, Dustin D. Updyke, Sean Huff
In this report, the authors introduce an approach to performance evaluation that focuses on self-assessment.
DOWNLOAD -
Counter AI: What Is It and What Can You Do About It?
• White Paper
By Nathan M. VanHoudnos, Shing-hon Lau, Carol J. Smith, Lauren McIlvenny, Greg Touhill, Matt Churilla
This paper describes counter artificial intelligence (AI) and provides recommendations on what can be done about it.
DOWNLOAD -
Terrain in Cyberspace Operations—Terminology
• White Paper
By Nathaniel Richmond, Vincent LaPiana
This paper defines several terms used to describe cyber operations and how they relate to other terms important to military operations and mission planning.
DOWNLOAD -
Lessons Learned in Coordinated Disclosure for Artificial Intelligence and Machine Learning Systems
• White Paper
By Matt Churilla, Allen D. Householder, Vijay S. Sarvepalli, Jeff Havrilla, Lena Pons, Shing-hon Lau, Nathan M. VanHoudnos, Andrew Kompanek, Lauren McIlvenny
In this paper, the authors describe lessons learned from coordinating AI and ML vulnerabilities at the SEI's CERT/CC.
DOWNLOAD -
Toward the Use of Artificial Intelligence (AI) for Advanced Persistent Threat Detection
• Technical Report
By Matthew Walsh, Clarence Worrell, Tom Scanlon
This report examines the feasibility and usefulness of implementing AI and ML in cyber defense with a particular focus on advanced persistent threats (APTs).
DOWNLOAD