Wednesday, March 26, 2025

Insider Threat, Bias in LLMs, Safe Coding, and Designing Safe Programs


As a part of an ongoing effort to maintain you knowledgeable about our newest work, this weblog put up summarizes some current publications from the SEI within the areas of insider danger, bias in giant language fashions (LLMs), safe coding and static evaluation, and designing safe programs.

These publications spotlight the most recent work from SEI technologists in these areas. This put up supplies a abstract for every publication and contains hyperlinks for entry on the SEI web site.

Risks of AI for Insider Threat Analysis (DARE)
by Austin Whisnant

Synthetic intelligence (AI) holds the promise of lowering insider danger incidents, nevertheless it comes with a novel set of challenges. This white paper outlines the potential pitfalls of leveraging AI for insider danger evaluation and suggests strategies for mitigating these challenges. Part 1 explains AI and its many implementations and purposes, together with these particular to the area of insider danger. Part 2 outlines the challenges and pitfalls of AI and the way these apply particularly to insider danger evaluation. Part 3 discusses at what level it’s applicable to make use of AI within the insider danger area and what to think about when implementing these strategies operationally.
Learn the SEI white paper.

Utilizing Function-Taking part in Situations to Establish Bias in LLMs
by Katherine-Marie Robinson and Violet Turri

Dangerous biases in giant language fashions (LLMs) make these fashions much less reliable and safe. Auditing for biases can assist establish potential options and develop higher guardrails to make this type of AI safer. On this podcast, Katie Robinson and Violet Turri, researchers within the SEI’s AI Division, talk about their current work utilizing role-playing recreation situations to establish biases in LLMs.
Take heed to/watch the SEI podcast.
Learn the SEI Weblog put up Auditing Bias in Giant Language Fashions.

Static Evaluation-Focused Automated Restore to Safe Code and Cut back Effort
by Lori Flynn and David Svoboda

Static evaluation instruments scan code, producing many defect alerts, however the alerts require skilled effort to validate. We developed an extensible instrument that robotically repairs related code for 3 particular varieties of alerts. With frequent instruments, customers can evaluate/settle for any repairs. We demo and describe how our instrument secures code and saves effort.

Static evaluation (SA) is an ordinary testing technique used to research supply code for defects. Most SA instruments use heuristic methods and have a tendency to supply many alerts, of which many are false positives. The price of consultants manually assessing alerts represents a major barrier to adoption of this key know-how for lowering safety defects. Consequently, most organizations restrict the scope of varieties of code flaws they search for. This presentation talks about our FY23-24 venture researching utilizing SA alerts to focus on automated program restore (APR) know-how to repair defects. On this presentation, we talk about our design selections, improvement strategies, and experimental take a look at outcomes. We present how our restore instrument can be utilized throughout take a look at & analysis and through improvement, whether or not utilizing steady integration (CI) automation or extra handbook processes. Then, we invite dialogue about methods our present restore instrument may very well be prolonged that might be useful to builders and evaluators. By design, our automated code repairs don’t break the code, no matter whether or not the alert is a real or false optimistic. Code repairs that eradicate false optimistic alerts are helpful in two methods: (1) skilled effort is reserved for adjudicating remaining alerts; and (2) the code can turn out to be simpler to grasp by people, for code improvement and safety evaluation. We deal with C/C++ as a result of we didn’t discover open supply APR instrument documentation that explicitly focuses on violations of CERT C safe coding guidelines. We additionally profit from Clang’s new JSON API. The Clang C/C++ compiler is open-source, cost-free, and broadly used. Moreover, we profit from the Clang capacity to export summary syntax timber (AST) as JSON recordsdata, facilitating mapping SA alerts to the AST nodes and thus focusing code restore effort.
Learn the convention paper.
Take heed to/watch the SEI podcast Automated Restore of Static Evaluation Alerts.

Assurance Proof of Constantly Evolving Actual-Time Programs (ASERT) Workshop 2024
By Dionisio de Niz, Bjorn Andersson, Mark H. Klein, Hyoseung Kim (College of California, Riverside), John Lehoczky (Carnegie Mellon College), George Romanski (Federal Aviation Administration), Jonathan Preston (Lockheed Martin Company), Daniel Shapiro (Institute of Protection Evaluation), Floyd Fazi (Lockheed Martin Company), and Ronald Koontz (Boeing Firm)

The second Assurance Proof for Constantly Evolving Actual-Time Programs (ASERT) workshop was held July 30 to 31, 2024, in Arlington, VA. It introduced collectively the members of the ASERT workgroup and included keynote audio system from the FAA, DOT&E, and DTE&A.

On this second workshop we reported on experiment zero, the place we analyzed the flight incident of the flight CI202 in Taiwan in 2020. We additionally mentioned with our keynote audio system the challenges confronted in improvement take a look at and analysis additionally within the operation phases which might be the main target of this workgroup.

On this doc we summarize the discussions and suggestions for the experiment zero presentation and concepts for the following experiment and on the event of the ASERT roadmap.
Learn the particular report.

Impartial Verification and Validation for Agile Tasks
by Justin Smith

Historically, impartial verification and validation (IV&V) is carried out by an impartial staff at program milestones and on the conclusion of improvement when software program is formally delivered. This conventional strategy permits an IV&V staff to offer enter on the varied formal milestone gates. As extra applications transfer to an Agile strategy, nevertheless, milestones aren’t as clearly outlined. Necessities, design, implementation, and testing can all occur iteratively, typically unfold over a number of years of improvement. On this Agile paradigm, IV&V groups could wrestle to determine add worth to this system at earlier factors within the lifecycle by getting in section with agile improvement cycles. This webcast highlights a novel strategy to offering IV&V for tasks utilizing an Agile or iterative software program improvement together with the next:

  • What adopting an Agile mindset for IV&V may appear to be
  • How specializing in capabilities and utilizing a risk-based perspective may assist drive planning in your staff
  • Methods to assist the IV&V staff get extra in section with the developer whereas remaining impartial

View the webcast.
Learn the SEI weblog put up Incorporating Agile Ideas into Impartial Verification and Validation

Self-Evaluation in Coaching and Train
by Dustin D. Updyke, Thomas G. Podnar, John Yarger, and Sean Huff

On this report, we introduce an strategy to efficiency analysis for cyber operators that focuses on self-assessment. We discover that this strategy supplies each higher data constancy to fulfill efficiency evaluation goals and the improved realism that cyber operators desired in coaching and train (T&E) actions. We implement an incident response instrument that permits staff members to file their actions and thought processes and facilitate assessing the staff’s skills. To validate our strategy, we carried out a survey of contributors who used the instrument to collect qualitative suggestions on its effectiveness. The outcomes of this survey spotlight the perceived enhancements in realism, the usefulness of self-assessment instruments, and the general affect on staff dynamics and particular person development. This mixed strategy supplies insights into staff efficiency, permits greatest practices to be recognized, helps the refinement of mitigation methods, and fosters actionable suggestions for studying. By selling self-assessment inside a practical T&E atmosphere, this technique improves total staff efficiency in cybersecurity operations by way of suggestions on particular person abilities and management competencies.
Learn the technical report.

Three Key Components for Designing Safe Programs[WS1]
by Timothy A. Chick

To make safe software program by design a actuality, engineers should deliberately construct in safety all through the software program improvement lifecycle. On this podcast, Timothy A. Chick, technical supervisor of the Utilized Programs Group within the SEI’s CERT Division, discusses designing, constructing, and working safe programs.
Take heed to/watch the SEI podcast.

Cybersecurity Metrics: Defending Information and Understanding Threats
by Invoice Nichols

Scoping down goals and figuring out what varieties of knowledge to collect are persistent challenges in cybersecurity. On this SEI podcast, Invoice Nichols, who leads the SEI’s Software program Engineering Measurements and Evaluation Group, discusses the significance of cybersecurity measurement, what sorts of measurements are utilized in cybersecurity, and what these metrics can inform us about cyber programs.
Take heed to/watch the SEI podcast.

Cyber Challenges in Well being Care: Managing for Operational Resilience
by Matthew J. Butkovic

On this webcast, Matthew Butkovic and Darrell Keeling discover approaches to maximise return on cybersecurity funding within the health-care context.

Well being-care organizations are seemingly besieged by a posh set of cyber threats. The results of disruptive cyber occasions in well being care are in some ways particularly troubling. Well being-care organizations typically face cyber challenges with modest assets. On this webcast, Matthew Butkovic and Darrell Keeling discover approaches to maximise return on cybersecurity funding within the health-care context. This contains making use of measures of operational resilience together with the next:

  • Easy methods to yield most return on cybersecurity funding in well being care
  • Easy methods to shift pondering from cybersecurity to operational resilience
  • Easy methods to make use of free or low-cost cybersecurity assets within the health-care context

View the webcast.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Stay Connected

0FansLike
3,912FollowersFollow
0SubscribersSubscribe
- Advertisement -spot_img

Latest Articles