This report describes the EMV2 Instance Model’s structure, the challenges encountered when defining it, and the rationale used to choose its structure. The Error ...
Proving the absence of use-after-free errors and other temporal memory safety vulnerabilities is complex and costly, particularly in large codebases such as those for mission-critical military systems ...
Ballman, A., 2014: Thread Safety Analysis in C and C++. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed February 19, 2026 ...
This contact form is for general questions and requests for contact. Do not use this contact form to send sensitive information. Please review the guidelines for sending sensitive information. If you ...
This podcast explores updates to the Pointer Ownership Model for C, a modeling framework designed to improve the ability of developers to statically analyze C programs for errors involving temporal ...
This short video explains how important it is for PMOs to build an Agile culture as part of adopting the Software Acquisition Pathway. Brigid O'Hearn (Software Modernization Policy Lead) of the ...
The Pointer Ownership Model (POM) project automates enforcement of temporal memory safety for C programs using a Large Language Model and a SAT Solver. Preventing ...
Engineering secure software is hard to do! In this talk, I discuss two high-level, requirements-based approaches to improving software quality. The first is using a ...
Presented at InfoSec World 2025 Home Publications Digital Library Dynamic Analysis of an Executable's System Impact ...
This newsletter compiles the latest SEI releases and news about Paul Nielsen stepping down as the SEI's director and CEO, milestones for the Stakeholder Specific Vulnerability Categorization (SSVC), ...
The Software Engineering Institute (SEI) is conducting research to leverage state-of-the-art generative AI techniques to allow warfighters to create digital twins of the physical world at the time and ...
This short video urges program offices to consider how to use both Agile methods and DevSecOps as part of adopting the Software Acquisition Pathway. Brigid O'Hearn (Software Modernization Policy Lead) ...