Carnegie Mellon University

Displaying 1 - 10 of 403 results

  • Using DidFail to Analyze Flow of Sensitive Information in Sets of Android Apps

    Webcasts // Nov 2015 // provided by Carnegie Mellon University

    In this webcast, the presenters discuss using DidFail to analyze flow of sensitive information in sets of Android Apps. They will discuss undesired flows of sensitive information within and between Android apps since one billion Android devices (phones and tablets) estimated sold in 2014.

    Watch Now
  • Four Types of Shift Left Testing

    Podcasts // Sep 2015 // provided by Carnegie Mellon University

    One of the most important and widely discussed trends within the software testing community is shift left testing, which simply means beginning testing as early as practical in the lifecycle. In this podcast, the speaker explains the importance of shift left testing and defines each of these four approaches using ...

    Listen Now
  • A Taxonomy of Testing Types

    Podcasts // Jul 2015 // provided by Carnegie Mellon University

    A surprisingly large number of different types of testing exist and are used during the development and operation of software-reliant systems. In this podcast, the speaker introduces the taxonomy of testing types the speaker created to help testers and testing stakeholders select the appropriate types of testing to for their ...

    Listen Now
  • Reducing Complexity in Software & Systems

    Podcasts // Jul 2015 // provided by Carnegie Mellon University

    In this podcast, the speaker discusses a two-year research project to investigate the nature of complexity, how it manifests in software-reliant systems, such as avionics, how to measure it and how to tell when too much complexity might lead to safety and certifiability problems.

    Listen Now
  • Designing Security Into Software-Reliant Systems

    Podcasts // Jun 2015 // provided by Carnegie Mellon University

    In this podcast, the speaker introduces the Security Engineering Risk Analysis (SERA) framework, a systematic approach for analyzing complex security risks in software-reliant systems and systems of systems early in the lifecycle. The framework integrates system and software engineering with operational security by requiring engineers to analyze operational security risks ...

    Listen Now
  • Agile Methods in Air Force Sustainment

    Podcasts // Jun 2015 // provided by Carnegie Mellon University

    For several years, the software engineering institute has researched the viability of agile software development methods within department of defense programs and barriers to the adoption of those methods. In this podcast, the speaker discusses how software sustainers leverage agile methods and avoid barriers to using agile methods.

    Listen Now
  • Data Driven Software Assurance

    Podcasts // Apr 2015 // provided by Carnegie Mellon University

    Software vulnerabilities are defects or weaknesses in a software system that, if exploited, can lead to compromise of the control of a system or the information it contains. The problem of vulnerabilities in fielded software is pervasive and serious. In this podcast, the speaker discusses a project that was launched ...

    Listen Now
  • Trends and New Directions in Software Architecture

    Webcasts // Apr 2015 // provided by Carnegie Mellon University

    Software architecture has enormous influence on the behavior of a system. For many categories of systems, early architectural decisions can be a greater influence on success than nearly any other factor. After more than twenty years of research and practice, the foundations for software architecture have been established and codified, ...

    Watch Now
  • Predicting Software Assurance Using Quality and Reliability Measures

    Podcasts // Jan 2015 // provided by Carnegie Mellon University

    Security vulnerabilities are defects that enable an external party to compromise a system. This podcast indicates that improving software quality by reducing the number of errors also reduces the number of vulnerabilities and hence improves software security. Some portion of security vulnerabilities (maybe over half of them) are also quality ...

    Listen Now
  • Tactical Cloudlets: Moving Cloud Computing to the Edge

    Webcasts // Jan 2015 // provided by Carnegie Mellon University

    In this webcast, the presenters will present the tactical cloudlet concept and experimentation results for five different cloudlet provisioning mechanisms. The goal is to demonstrate that cyber-foraging in tactical environments is possible by moving cloud computing concepts and technologies closer to the edge so that tactical cloudlets, even if disconnected ...

    Watch Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?