This contact form is for general questions and requests for contact. Do not use this contact form to send sensitive information. Please review the guidelines for sending sensitive information. If you ...
Software is a crucial and growing part of the organizational security, cybersecurity, and the national security mission. The Defense Science Board (DSB) Task Force on the Design and Acquisition of ...
Eileen Wrubel (Technical Director of Smart Software Acquisition) of the Software Solutions Division at the SEI explains how program offices must consistently and continuously involve users in the ...
Our latest podcast highlights an AI Adoption Maturity Model that organizations can use to create a roadmap for predictable AI adoption and realization of AI benefits.
This newsletter compiles the latest SEI releases and news about the upcoming symposium Cyber Mission Readiness in the Age of AI, using public LLMs to rapidly develop tools for use in classified ...
Proving the absence of use-after-free errors and other temporal memory safety vulnerabilities is complex and costly, particularly in large codebases such as those for mission-critical military systems ...
The Pointer Ownership Model (POM) project automates enforcement of temporal memory safety for C programs using a Large Language Model and a SAT Solver. Preventing ...