Sunday, March 26, 2023
HomeSoftware EngineeringDigital Engineering, AI, and Deepfakes

Digital Engineering, AI, and Deepfakes


As a part of an ongoing effort to maintain you knowledgeable about our newest work, this weblog publish summarizes some latest publications from the SEI within the areas of coordinated vulnerability disclosure, zero belief, CSIRTS, synthetic intelligence, deepfakes, and digital engineering. These publications spotlight the newest work of SEI technologists in these areas.

In case you missed it in our earlier publish, we’re additionally together with a hyperlink to our 2021 SEI Yr in Evaluation, which highlights our work in synthetic intelligence, cybersecurity, and software program engineering undertaken through the 2021 fiscal 12 months.

This publish features a itemizing of every publication, creator(s), and hyperlinks the place they are often accessed on the SEI web site.

SEI Yr in Evaluation

All the time targeted on the long run, the Software program Engineering Institute (SEI) advances software program as a strategic benefit for nationwide safety. We lead analysis and direct transition of software program engineering, cybersecurity, and synthetic intelligence applied sciences on the intersection of academia, business, and authorities. We serve the nation as a federally funded analysis and improvement heart (FFRDC) sponsored by the U.S. Division of Protection (DoD) and are based mostly at Carnegie Mellon College, a world analysis college yearly rated among the many finest for its applications in laptop science and engineering.

The 2021 SEI Yr in Evaluation highlights the work of the institute undertaken through the fiscal 12 months spanning October 1, 2020, to September 30, 2021.
Learn or obtain the SEI Yr in Evaluation.

Coordinated Vulnerability Disclosure Person Tales
by Brad Runyon, Eric Hatleback, Allen D. Householder, Artwork Manion, Vijay Sarvapalli, Timur D. Snoke, Jonathan Spring, Laurie Tyzenhaus, Charles G. Yarbrough

This white paper paperwork the assorted person tales that the CERT Coordination Heart staff might think about. The person tales are anticipated to be utilized by the reader to higher perceive, create, and implement a coordinated vulnerability disclosure protocol. As well as, the CERT/CC believes these use circumstances are appropriate for any enterprise designing or implementing its personal CVD insurance policies, processes, and procedures.
Learn the white paper.

The 4 Phases of the Zero Belief Journey
by Timothy Morrow and Matthew Nicolai

Over the previous a number of years, zero belief structure has emerged as an necessary matter inside the area of cybersecurity. Heightened federal necessities and pandemic-related challenges have accelerated the timeline for zero belief adoption inside the federal sector. Personal sector organizations are additionally trying to undertake zero belief to carry their technical infrastructure and processes in step with cybersecurity finest practices. Actual-world preparation for zero belief, nonetheless, has not caught up with present cybersecurity frameworks and literature. NIST requirements have outlined the specified outcomes for zero belief transformation, however the implementation course of continues to be comparatively undefined. Because the nation’s first federally funded analysis and improvement heart with a transparent emphasis on cybersecurity, the SEI is uniquely positioned to bridge the hole between NIST requirements and real-world implementation. On this SEI podcast, Tim Morrow and Matthew Nicolai, researchers with the SEI’s CERT Division define 4 steps that organizations can take to implement and preserve a zero belief structure.
Obtain/view the podcast.

Enabling the Sustainability and Success of a Nationwide Pc Safety Incident Response Workforce
by Tracy Payments, Brittany Manley, and James Lord

A nationwide laptop safety incident response staff (CSIRT)[HAB1] serves a novel position in defending and defending its nation or economic system from cybersecurity incidents that may have an effect on nationwide or financial safety and public security. It serves as a middle of technical functionality for the prevention, detection, and response coordination of cybersecurity incidents.

Over the previous thirty years, greater than 130 nationwide CSIRTs have been established. Additionally, throughout this time, organizations have produced numerous paperwork and sources that handle finest practices for creating and managing CSIRTs, together with nationwide CSIRTs. Nonetheless, due to variations in tradition, economics, and authorities construction, the group and tasks of nationwide CSIRTs range amongst international locations and economies. Such variations embrace what number of nationwide CSIRTs serve a rustic, the place they’re situated, who their constituencies are, and the character of their providers and tasks. With so many variables, how is it attainable to make sure the sustainability and success of a nationwide CSIRT?

This doc can be utilized along side present useful resource supplies to assist prioritize efforts for creating or enhancing a nationwide CSIRT.
Obtain the handbook.

What are Deepfakes, and How Can We Detect Them?
by Shannon Gallagher and Dominic Ross

On this webcast, Shannon Gallagher and Dominic Ross focus on what deepfakes are, and the way they’re constructing AI/ML tech to differentiate actual from pretend. They’ll begin with some well-known examples of deepfakes and focus on what makes them distinguishable as pretend for folks and computer systems.

The webcast will cowl

  • the definition of deepfake
  • fooling computer systems versus fooling folks
  • how digital fingerprints are utilized in detection algorithms
  • challenges within the area

View the webcast.
Obtain/view a podcast on deepfakes.

Belief and AI Techniques
by Carol Smith and Dustin Updyke

To make sure belief, synthetic intelligence programs should be constructed with equity, accountability, and transparency at every step of the event cycle. On this podcast, Carol Smith, a senior analysis scientist in human machine interplay, and Dustin Updyke, a senior cybersecurity engineer within the SEI’s CERT Division, focus on the development of reliable AI programs and components influencing human belief of AI programs.
Obtain/view the podcast.

Challenges and Metrics in Digital Engineering
by William Nichols

Digital engineering makes use of digital instruments and representations within the strategy of creating, sustaining, and sustaining programs, together with necessities, design, evaluation, implementation, and check. The digital modeling method is meant to determine an authoritative supply of fact for the system, wherein discipline-specific views of the system are created utilizing the identical mannequin components. On this SEI Podcast, William “Invoice” Nichols, a senior member of the technical workers with the SEI’s Software program Options Division, discusses with principal researcher Suzanne Miller the challenges in making the transition from conventional improvement practices to digital engineering.
Obtain/view the podcast.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments