Technical Papers
The SEI Digital Library houses thousands of technical papers and other documents, ranging from SEI Technical Reports on groundbreaking research to conference proceedings, survey results, and source code.
Filter by
-
Observational Human–AI (OHAI): A Defender Attribution Framework for Distinguishing Human vs. AI Threats
• White Paper
By Dustin D. Updyke, David Rossell, Shelly Fitzgerald
OHAI is a proposed framework for providing probabilistic human‑to‑autonomous attribution in cyber incidents.
DOWNLOAD -
Report on the First MBSynergy Workshop
• Technical Report
By Will Hayes, Peter Capell, Nataliya Shevchenko, Jerome Hugues
MBSynergy research focuses on ways of pursuing government equities using MBSE and digital engineering in DoD and IC settings; this report describes this team’s first working session.
DOWNLOAD -
Software Bill of Materials (SBOM) Harmonization Plugfest 2024
• Special Report
By Jason Fricke, David Tobar, Jessie Jamieson, Mark Priest, Sasank Vishnubhatla
In this report, the authors describe the research findings and recommendations that resulted from the 2024 Software Bill of Materials (SBOM) Harmonization Plugfest research project.
DOWNLOAD -
What Can Generative AI Red-Teaming Learn from Cyber Red-Teaming?
• Technical Report
By Michael Feffer, Keltin Grimes, Ellie Soto, James Lucassen Hoda Heidari, Nathan M. VanHoudnos, Anusha Sinha
This paper investigates the applicability of established cyber red-teaming methodologies to the evaluation of generative AI systems, addressing the growing need for robust security assessments in AI-driven applications.
DOWNLOAD -
Practical Supervised Machine Learning Classification of Highly Imbalanced Text
• White Paper
By Austin Whisnant
In this paper, Austin Whisnant describes a machine learning model used to build a corpus of insider threat data to support insider threat research.
DOWNLOAD -
Kubernetes (k8s) in the Air Gap
• White Paper
By Matthew Heckathorn, Maxwell Trdina
This paper explains how the act of mirroring the required container images for a k8s deployment in the air gap has become increasingly simplified in the past few years.
DOWNLOAD -
Center for Calibrated Trust Measurement and Evaluation (CaTE)—Guidebook for the Development and TEVV of LAWS to Promote Trustworthiness
• White Paper
By Daniel Justice, Andrew O. Mellinger, Christopher Fairfax, Tyler Brooks
This guidebook supports personnel in the development and testing of autonomous weapon systems that employ ML, focusing on system reliability and operator trust.
DOWNLOAD -
Reference Architecture for Assuring Ethical Conduct in LAWS
• White Paper
By Eric Heim, Andrew O. Mellinger, Tyler Brooks, Andrew Schellenberg, Charles Loughin, Emily Newman
This reference architecture provides guidance to reason about designing and developing ML-enabled autonomous systems that have the capability to use lethal force.
DOWNLOAD -
Key Takeaways from Zero Trust Industry Day 2024
• White Paper
By Patsy Bulisco, Rhonda Brown
This paper describes key takeaways from Zero Trust Industry Day 2024.
DOWNLOAD -
AI Hygiene Starts with Models and Data Loaders
• White Paper
By Matt Churilla, Shing-hon Lau, Renae Metcalf, Mahmoud Shabana
This paper places a call to action for traditional cybersecurity tools and techniques to be applied to artificial intelligence (AI) for improving the cybersecurity of AI systems.
DOWNLOAD