Publications and Media

Digital Library

The SEI publishes extensively to connect with and deliver our most recent advancements in software engineering, cyber, artificial intelligence, and acquisition transformation to the software community. We publish our research in elite journals, and we also produce technical reports, white papers, webcasts, and much more—all of which we make available in our digital library. We’ve collected thousands of publications over decades of research that you can download today.

Search the digital library

Get our latest innovations in your inbox

Subscribe to SEI Bulletin

or follow us on social media

Technical Papers

Blog Posts

Managing Architectural Risk During Agile Development

By weighing the tradeoffs between design pattern attributes and quality attributes, software developers can identify architectural risks early and assess the system impacts of design …

The ELM Library: An LLM Evaluation Toolset

To help teams meet the need for rigorous evaluation methods, researchers in SEI’s AI Division developed a library built on best practices for LLM evaluation …

Data Poisoning in AI Models: The Case for Chain of Custody Controls

This post explores data poisoning, which occurs when training data is modified to influence the performance of a model, and proposes cryptographic chain of custody …

Using Data and Data Analytics to Improve Cyber Resilience

Our post highlights the use of data analytics as a force multiplier for cyber resilience as well as best practices to help organizations gain situational …

Podcasts

Goal-Line Defense: A Tool to Discover and Mitigate UEFI Vulnerabilities
Goal-Line Defense: A Tool to Discover and Mitigate UEFI Vulnerabilities
This podcast explores CERT UEFI Parser, a new, open source tool that uses program analysis to reveal the architecture of UEFI software, and explore this …
Leadership, Legacy, and the Power of Mentors: Insights from Dr. Paul Nielsen
Leadership, Legacy, and the Power of Mentors: Insights from Dr. Paul Nielsen
Paul Nielsen, the SEI's director and chief executive officer, discusses his legacy, the impact of mentors, and the importance of encouraging scientists and engineers to …
With a Little Help from Our Civilian Friends: Cybersecurity Reserve Is Both Feasible and Advisable
With a Little Help from Our Civilian Friends: Cybersecurity Reserve Is Both Feasible and Advisable
Marie Baker, Chris May, and Mike Winter discuss findings from a Pentagon-commissioned study assessing the feasibility of a civilian cybersecurity reserve.
Maturing AI Adoption: From Chaos to Consistency
Maturing AI Adoption: From Chaos to Consistency
Our latest podcast highlights an AI Adoption Maturity Model that organizations can use to create a roadmap for predictable AI adoption and realization of AI …

Webcasts

Latest webcasts

AI-Native Software Engineering: Enduring Principles, New Pace
AI-Native Software Engineering: Enduring Principles, New Pace
In this webcast, SEI researchers discuss observations and lessons from their application of AI-native software engineering and the study of its use across multiple projects.
Software Acquisition Go Bag: Pack Light, Measure Right
Software Acquisition Go Bag: Pack Light, Measure Right
In this webcast, SEI researchers discuss the why, what, and how behind metrics that will enable your team to move from “just collecting data” to …
Ensuring the Safety and Security of AI Systems
Ensuring the Safety and Security of AI Systems
In this webcast, SEI researchers explain how System Theoretic Process Analysis helps organizations build stronger assurances about the safety and security of complex systems, including …
Tools for Building an AI-Enabled SOC
Tools for Building an AI-Enabled SOC
In this webcast, Justin Novak and Christopher Ian Rodman discuss how AI can be leveraged to build out and enable your security operations center (SOC) …

Vulnerability Notes

The SEI builds relationships with software vendors and other organizations to coordinate prompt responses to possible risks or threats that arise from software vulnerabilities. Over the years, we have built an extensive vendor network, and we work as a trusted broker to identify, disclose, and mitigate vulnerabilities. As part of this effort, we publish vulnerability notes to keep the community informed and to enable effective and swift mitigation.