Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1 - 25 of 196

CMVP Approved Security Functions

July 25, 2023
Author(s)
Alexander Calis
The approved security functions listed in this publication replace the ones listed in International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 19790 Annex C and ISO/IEC 24759 6.15, within the context of the

Discovery of digital forensic dataset characteristics with CASE-Corpora

February 13, 2023
Author(s)
Alexander Nelson, Eoghan Casey
The digital forensics community has generated training and reference data over the course of decades. However, significant challenges persist today in the usage pipeline for that data, from research problem formulation, through discovery of applicable

Discovery of digital forensic dataset characteristics with CASE-Corpora

July 11, 2022
Author(s)
Alexander Nelson
The digital forensics community has generated training and reference data over the course of decades. However, significant challenges persist today in the usage pipeline for that data, from research problem formulation, through discovery of applicable

Client-side XSLT, Validation and Data Security

November 22, 2021
Author(s)
Wendell Piez
Client-side XSLT (CSX) is often used in scenarios where data (in XML) from a remote server is provided to a user who processes it in some way, for example rendering it locally for display. That is, the server provides the data and the client does the work

NVLAP Cryptographic and Security Testing

June 30, 2021
Author(s)
Bradley Moore, Beverly Trapnell, James F. Fox, Carolyn French
NIST Handbook 150-17 presents the technical requirements and guidance for the accreditation of laboratories under the National Voluntary Laboratory Accreditation Program (NVLAP) Cryptographic and Security Testing (CST) program. It is intended for

Challenge Design and Lessons Learned from the 2018 Differential Privacy Challenges

April 12, 2021
Author(s)
Diane Ridgeway, Mary Theofanos, Terese Manley, Christine Task
The push for open data has made a multitude of datasets available enabling researchers to analyze publicly available information using various statistical and machine learning methods in support of policy development. An area of increasing interest that is

Interoperability Analysis Tool for IEC 61850-9-2 Standard-based Merging Units

February 18, 2019
Author(s)
Yuyin Song, Gerald J. FitzPatrick, Kang B. Lee, Avi M. Gopstein
Interoperability test and plugfest provide a congenial environment to test and assure interoperability of power grid devices helping to achieve equipment plug and play. However, interoperability analysis and evaluation are very time-consuming and error

A Method-Level Test Generation Framework for Debugging Big Data Applications

January 24, 2019
Author(s)
Raghu N. Kacker, David R. Kuhn, Huadong Feng, Yu J. Lei
Big data applications are now widely used to process massive amounts of data we create every day. When a failure occurs in a big data application, debugging at the system-level input can be expensive due to the large amount of data being processed. This

Guidance for Evaluating Contactless Fingerprint Acquisition Devices

July 27, 2018
Author(s)
John M. Libert, John D. Grantham, Bruce Bandini, Stephen S. Wood, Michael D. Garris, Kenneth Ko, Frederick R. Byers, Craig I. Watson
This document details efforts undertaken by the National Institute of Standards and Technology (NIST) to develop measurements and a protocol for the evaluation of contactless (touchless) fingerprint acquisition devices. Contactless fingerprint capture

Improving Software Assurance through Static Analysis Tool Expositions

October 31, 2017
Author(s)
Terry S. Cohen, Damien J. Cupif, Aurelien M. Delaitre, Charles Daniel De Oliveira, Elizabeth N. Fong, Vadim Okun
Multiple techniques and tools prove effective for software assurance. One technique that has grown in acceptance since the early 2000s is static analysis, which examines software for weaknesses without executing it. The National Institute of Standards and

What Happened to Software Metrics?

May 25, 2017
Author(s)
Jeffrey M. Voas, David R. Kuhn
In the 1980's, the software quality community was all 'a buzz' with seemingly endless 'potential' approaches for producing higher quality software. At the forefront of that was software metrics, along with the corresponding software testing techniques and
Was this page helpful?