Movatterモバイル変換


[0]ホーム

URL:


icon-carat-rightmenusearchcmu-wordmark
Carnegie Mellon University
Our Research

Cybersecurity Engineering

The Software Engineering Institute (SEI) stands on the front lines of defense against cyber adversaries. Our cybersecurity engineering (CSE) research protects and defends national security systems, software components, and data from unauthorized access, cyberattacks, and other malicious activities.

With new vulnerabilities emerging daily, staying ahead of threats in today’s fast-paced cybersecurity landscape is a race against time. At the SEI, our mission-driven focus is to strengthen our nation's cybersecurity infrastructure by securing the country's most critical systems and protecting agencies and systems from a loss of confidentiality, integrity, or availability (CIA) due to cyber threats.

It's vital to balance opportunities, such as shared resources and capabilities, third-party tools, and cloud capacity, with the increased cybersecurity risk that these opportunities introduce to the defense industrial base (DIB). To reduce risk, it's imperative to implement effective and repeatable practices that can respond to changing technology needs, discover vulnerabilities before attackers do, manage the growing threats against software products that support critical infrastructure, enable warfighters, monitor and manage money, and control physical resources, buildings, and transportation.

The SEI’s CSE researchers aim to ensure that the acquisition and development process is secure from the start. Our mission success is dependent on making sure that stakeholders make choices that protect them against legacy or weak supply chain management (SCRM), software acquisition, or development practices and strengthen cybersecurity resilience. With a deep, scalable understanding of how to detect and defend against security weaknesses and exploitation, our cybersecurity professionals are driven to harden the nation’s vulnerability surface and protect national security interests.

Advance Cybersecurity Resilience

The goal of CSE is to ensure that the software the Department of Defense (DoD) and federal agencies develop or acquire delivers the expected functionality and blocks actions that might introduce risk. To achieve this goal, the SEI helps prepare managers, engineers, developers, testers, and other groups involved in lifecycle tasks, to build and field effective cybersecurity in current and future software acquisition and development, validate and sustain cybersecurity in systems and software, and deliver the mission impact your organization expects of its software.

Build Security into Application Lifecycles

The SEI’s CSE team leverages expertise in system and software engineering, risk management, program management, measurement, and cybersecurity to create methods and solutions that you can integrate into your existing acquisition and development lifecycle practices. To this end, the SEI offers many tools and approaches to help engineering, development, acquisition, and sustainment groups that work in or with your organization.

The SEI continues to expand CSE research through engagements with the DoD and other federal agencies to address real-world challenges. Over the years, we have shared our findings in many notable publications, includinga book on cybersecurity,a paper on assessing DoD risk in acquisition, and aprogram manager’s guidebook for software assurance.

Related Job Openings

Associate Real-Time Embedded Software Engineer

Locations

Pittsburgh, PA

Real-Time Embedded Software Engineer

Locations

Pittsburgh, PA

Sr. Embedded Software Engineer

Locations

Pittsburgh, PA

SEE ALL SEI JOB OPENINGS

What We Offer

certificate

CERT Applied Data Science for Cybersecurity Professional Certificate

This professional certificate program introduces foundational concepts of statistical analysis as a precursor to analyzing data for cybersecurity. SEI instructors teach concepts and techniques to apply data analysis in the context of NetFlow, malware, and digital forensics data. Additionally, students have opportunities to apply what they learned in specifically designed exercises. The curriculum concludes with an examination assessing the student’s comprehension of the material taught.
Register

certificate

CERT Cybersecurity Engineering and Software Assurance Professional Certificate

This program explores software-reliant systems engineering and acquisition activities to help information systems professionals improve their awareness of cybersecurity and establish an approach to identifying security requirements.
Register

service

Expert support for establishing cybersecurity engineering practices

Contact us to work with experts that can help you establish sound cybersecurity engineering practices.
Learn More

service

Software assurance curricula for graduate and undergraduate programs

You can incorporate these free curricula into existing education programs or use them to develop new courses. These curricula include materials for undergraduate and graduate programs as well as other materials for educators.
Read More

tool

CERT SQUARE for Acquisition (A-SQUARE)

SQUARE-A is designed for stakeholders, requirements engineers, and contractors/vendors to use in acquisitions and provides documentation support for a variety of use cases.
Download

tool

CERT SQUARE for Privacy (P-SQUARE)

P-SQUARE was designed for stakeholders, requirements engineers, and administrators and supports the security and privacy aspects of SQUARE.
Download

tool

Introduction to the Security Engineering Risk Analysis (SERA) Framework

This report introduces the SERA Framework, a model-based approach for analyzing complex security risks in software-reliant systems and systems of systems early in the lifecycle.
Learn More

tool

Prototype Software Assurance Framework (SAF): Introduction and Overview

In this report, the authors discuss the Software Assurance Framework (SAF), a collection of cybersecurity practices that programs can apply across the acquisition lifecycle and supply chain.
Learn More

tool

Redemption: Automated Repair of Static Analysis Alerts

The Redemption tool makes automated repairs to C and C++ source code based on defect alerts produced by static-analysis tools.
Download
1/2

webcast

Can a Cybersecurity Parametric Cost Model be Developed?

In this webcast, Christopher Miller shares insights from a Carnegie Mellon University Software Engineering Institute study on cybersecurity cost estimating that can help national security organizations successfully deploy parametric cost modeling.
Watch

webcast

Cyber Challenges in Health Care: Managing for Operational Resilience

In this webcast, Matthew Butkovic and Darrell Keeling explore approaches to maximize return on cybersecurity investment in the health-care context.
Watch

webcast

Elements of Effective Communications for Cybersecurity Teams

In this webcast, Cybersecurity Operations Researcher Sharon Mudd leverages the National Institute of Standards and Technology Cybersecurity Framework and the Forum of Incident Response and Security Teams CSIRT Services Framework to explain communications responsibilities in the standard incident management lifecycle and as an integral piece of crisis management support.
Watch

webcast

How Can Data Science Solve Cybersecurity Challenges?

In this webcast, Tom Scanlon, Matthew Walsh and Jeffrey Mellon discuss approaches to using data science and machine learning to address cybersecurity challenges.
Watch

webcast

Using a Scenario to Reason About Implementing a Zero Trust Strategy

In this webcast, Tim Morrow, Rhonda Brown and Elias Miller discuss an approach that organizations can use to help develop the contextual awareness needed to apply a zero-trust strategy.
Watch

webcast

What Is Cybersecurity Engineering and Why Do I Need It?

This webinar addresses how cybersecurity engineering knowledge, methods, and tools can reduce cyber risk and increase operational cyber resilience of software-intensive systems.
Watch
1/2

Additional Resources

The Latest from theSEI Blog

Headshot of Alex Vesey.

Stop Imagining Threats, Start Mitigating Them: A Practical Guide to Threat Modeling

Blog Post

When building a software-intensive system, a key part in creating a secure and robust solution is to develop a cyber threat model.

READ
Headshot of Jeff Mellon.

Cyber-Informed Machine Learning

Blog Post
and

This blog post proposes cyber-informed machine learning as a conceptual framework for emphasizing three types of explainability when ML is used for cybersecurity.

READ
See All

The Latest from theDigital Library

white-paper-thumbnail-1

AI Hygiene Starts with Models and Data Loaders

White Paper
,,, and

This paper places a call to action for traditional cybersecurity tools and techniques to be applied to artificial intelligence (AI) for improving the cybersecurity of AI systems.

Read
fact-sheet-thumbnail-1

Do You Know What Your Software Is Actually Doing?

Fact Sheet
Software Engineering Institute

Silent Sentinel helps system owners evaluate software before releasing or deploying it.

Learn More
See All

Explore Our Cybersecurity Engineering Projects

Automated Repair of Static Analysis Alerts (Redemption of False Positives)

The SEI Redemption tool extensibly repairs code associated with static analysis alerts. Currently, it repairs uninitialized memory, null pointer, and other C/C++ weaknesses.
Learn More

Security-Aware Acquisition

The techniques developed by CERT researchers help you evaluate and manage cyber risk in today’s complex software supply chains.
Learn More

Our Vision for the Future of Cybersecurity Engineering

The SEI’s cybersecurity professionals are working to expand available CSE options to bolster national security. We are currently developing and tailoring archetypes to support agencies in identifying cybersecurity risks improving evaluation of mission impact.

To collaborate on these new projects in the field of cybersecurity engineering, contact us.

Our Vision for the Future of Cybersecurity Engineering

The SEI’s cybersecurity professionals are working to expand available CSE options to bolster national security. We are currently developing and tailoring archetypes to support agencies in identifying cybersecurity risks improving evaluation of mission impact.

To collaborate on these new projects in the field of cybersecurity engineering, contact us.


[8]ページ先頭

©2009-2025 Movatter.jp