NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Yining Luo, Baobao Li, Anoop Singhal, Pei-Yu Tseng, Lan Zhang, Qingtian Zou, Xiaoyan Sun, Peng Liu
Large Language Models (LLMs) have shown promise in automating code vulnerability repair, but their effectiveness in handling real-world code remains limited. This paper investigates the capability of LLMs, in repairing vulnerabilities and proposes a
Image Processing in Python for 3D image stacks, or IMPPY3D, is a free and open-source software (FOSS) repository that simplifies post-processing and 3D shape characterization for grayscale image stacks, otherwise known as volumetric images, 3D images, or
Software metrics are theoretically impossible. However, there is tremendous benefit if we can assess properties of computerized systems. We review the elements that make it hard to computerized systems, in contrast with Civil Engineering or physical
In February 2024 the U.S. White House Office of the National Cyber Director (ONCD) released "Back to the Building Blocks: A Path Toward Secure and Measurable Software.'' The report makes the case that the technical community can greatly improve
The Bugs Framework (BF) is a classification of security bugs and related faults, featuring a formal language for unambiguous specification of security weaknesses and underlined by them vulnerabilities. It organizes bugs and faults by the operations of
As modern networks grow in complexity, ensuring their reliability and security becomes increasingly vital. Data plane analysis is a key process for verifying network behavior, but traditional data plane analysis tools face challenges in extensibility
Michael Majurski, Parniyan Farvardin, Sumeet Menon, David Chapman
Discriminative deep learning models with a linear+softmax final layer have a problem: the latent space only predicts the conditional probabilities $p(y|x)$ but not the full joint distribution $p(y,x)$, which necessitates a generative approach. The
The National Institute of Standards and Technology (NIST) is evaluating and improving the specification for achieving interoperability of containerized computational software. Adherence to a specification for Findable, Accessible, Interoperable, and
In digital forensics, file system analysis is a precursor task to event reconstruction. Often, unallocated content within a file system is content of interest to an investigation, and thus recognition, extraction, and ascription of unallocated files are
Amar Abane, Abdella Battou, Mheni Merzouki, Tao Zhang
To address the increasing complexity of network management and the limitations of data repositories in handling the various network operational data, this paper proposes a novel repository design that uniformly represents network operational data while
The current state of the art in software security -- describing weaknesses as CWEs, vulnerabilities as CVEs, and labeling CVEs with CWEs -- is not keeping up with the modern cybersecurity research and application requirements for comprehensively labeled
Wesley Garey, Tanguy Ropitault, Richard A. Rouil, Evan Black, Weichao Gao
The Open Radio Access Network (O-RAN) Alliance is an industryled standardization effort, with the main objective of evolving the Radio Access Network (RAN) to be open, intelligent, interoperable, and autonomous to support the ever growing need of improved
Motivation: Software security vulnerabilities are leveraged to attack cyberspace and critical infrastructure, leading to security failures. When communicating about them, however, even security experts might conflate essential related software concepts
Motivation: Crucial need of a formal classification system allowing unambiguous specification of software security bugs and weaknesses, and the vulnerabilities that exploit them. Objective: Create bug models, weakness taxonomies, and vulnerability models
Motivation: Crucial need for systematic comprehensive labeling of the more than 228 000 publicly disclosed cybersecurity CVE vulnerabilities to enable advances in modern AI cybersecurity research. Objective: Utilize the Bugs Framework (BF) formalism for BF
Labeling software security vulnerabilities would benefit greatly modern artificial intelligence cybersecurity research. The National Vulnerability Database (NVD) partially achieves this via assignment of Common Weakness Enumeration (CWE) entries to Common
Stablecoins are cryptocurrencies whose price is pegged to that of another asset (typically one with low price volatility). The market for stablecoins has grown tremendously – up to almost $200 billion USD in 2022. These coins are being used extensively in
Yooyoung Lee, Craig Greenberg, Asad Butt, Eliot Godard, Elliot Singer, Trang Nguyen, Lisa Mason, Douglas Reynolds
In 2022, the U.S. National Institute of Standards and Technology (NIST) conducted a Language Recognition Evaluation (LRE), which was the latest in an ongoing series of language detection evaluations administered by NIST since 1996. The LREs measure how
Charles D. De Oliveira, Elizabeth Fong, Paul E. Black
The Software Assurance Metrics and Tool Evaluation (SAMATE) team studied thousands of warnings from static analyzers. Tools have difficulty distinguishing between the absence of a weakness and the presence of a weakness that is buried in otherwise
Miranda Mundt, Jonathan Bisila, Jonathan E. Guyer, Daniel Howard, Daniel S. Katz, Reed Milewicz, Henry Schreiner, Joshua Teves, Chris Wiswell
The explosion of Research Software Engineers (RSEs) in the United States created the opportunity to form communities of practice (CoP), groups which share a passion for an activity and learn how to do it better as they interact regularly, specifically to
Simulation is a useful and effective way to analyze and study complex, real-world systems. It allows researchers, practitioners, and decision makers to make sense of the inner working of a system that involves many factors often resulting in some sort of
Mohammed Farhan, Caroline Krejci, Megan Olsen, M S Raunak
Proper validation of a simulation model is essential to have confidence on its accuracy and credibility. However, many of the most effective approaches for simulation validation require access to data that may not always be available. Metamorphic Testing
A Deep Neural Network (DNN) based system, such as the one used for autonomous vehicle operations, is a "black box" of complex interactions resulting in a classification or prediction. An important question for any such system is how to increase the
Peter Bajcsy, Mylene Simon, Sunny Yu, Nick Schaub, Jayapriya Nagarajan, Sudharsan Prativadi, Mohamed Ouladi, Nathan Hotaling
Microscopy image-based measurement variability in high-throughput imaging experiments for biological drug discoveries, such as COVID-19 therapies was addressed in this study. Variability of measurements came from (1) computational approaches (methods), (2)