资讯

CMU SEI is revolutionizing defense acquisition for software and systems—making it faster, leaner, and more innovative.
SEI Certificate Holders The individuals listed below have earned an SEI certificate and requested that the SEI include their information on this list. You can earn an SEI certificate by completing a ...
This SEI Blog post highlights the application of MDE tools for automatic code generation and provides a template for collecting information from MDE vendors.
As a vulnerability analyst at the CERT Coordination Center, I am interested not only in software vulnerabilities themselves, but also exploits and exploit mitigations.
The SEI led the community in creating this multi-year research and development vision and roadmap for engineering next-generation software-reliant systems.
This post reviews the origins and interactions of the software, cybersecurity, and AI engineering disciplines and posits how their interrelationships would contribute to the intelligent systems of the ...
This blog post expands on concerns brought to light from recent UEFI attacks, such as BlackLotus, and highlights 5 recommendations to secure and restore trust in the UEFI ecosystem.
This post explains how to build a large language model across three primary use cases: basic question-and-answer, question-and-answer over documents, and document summarization.
Training courses, workshops, and seminars help transition SEI technology and research to the broader community, disseminating recent advances relevant to our mission.
This blog post explores the efficacy of ChatGPT 3.5 in identifying errors in software code.
Learn how to scale Agile methods in complex settings with larger teams, systems, and diverse environments in this informative blog post from the SEI.
Each year brings new cybersecurity threats, breaches, and previously unknown vulnerabilities in established systems. Even with unprecedented vulnerabilities such as Spectre and Meltdown, the approach ...