NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
In preparation for SATE VI, we present our current thoughts on the Ockham Sound Analysis Criteria track. First, we explain the purpose of the Ockham track and define some terms, such as "sound", "finding", and "site". Then we present the general flow for
Anthony Downs, William Harrison, Craig I. Schlenoff
Researchers at the National Institute of Standards and Technology (NIST) have developed a set of draft standard test methods for measuring and promoting software agility in industrial robots. These test methods are being used as the basis for an upcoming
This bulletin summarized the information presented in NISTIR 8151: Dramatically Reducing Software Vulnerabilities: Report to the White House Office of Science and Technology Policy. The publication starts by describing well known security risks and
One approach for reducing damage caused by software vulnerabilities is to take advantage of emerging systems architecture patterns to strategically improve assurance. Emerging systems architectures embody significant choices about where computation takes
Paul E. Black, Mark L. Badger, Barbara Guttman, Elizabeth N. Fong
The call for a dramatic reduction in software vulnerability is heard from multiple sources, recently from the February 2016 Federal Cybersecurity Research and Development Strategic Plan. This plan starts by describing well known risks: current systems
Justin Zook, John G. Cleary, Len Trigg, Francisco De La Vega
To evaluate and compare the performance of variant calling methods and confidence scores, comparisons between a test call set and a "gold standard" need to be carried out. Unfortunately, these comparisons are not straightforward with the current Variant
Arunima Singh, Kiran Mathew, Joshua Grabriel, Kamal Choudhary, Susan B. Sinnott, Albert Davydov, Francesca M. Tavazza, Richard G. Hennig
A Materials Project based open-source python tool, MPInterfaces, has been developed to automate the high throughput computational screening and study of interfacial systems. The framework encompasses creation and manipulation of interface structures for
Static analyzers examine the source or executable code of programs to find problems. Many static analyzers use some heuristics or approximations to handle programs up to millions of lines of codes. We established the Ockham Sound Analysis Criteria to
Paul E. Black, Irena V. Bojanova, Yaacov Yesha, Yan Wu
High-confidence systems must not be vulnerable to attacks that reduce the security, reliability, or availability of the system as a whole. One collection of vulnerabilities is the Common Weakness Enumeration (CWE). It represents a considerable community
Our vision for a "periodic table" of bugs is a "natural" organization of a catalog or dictionary or taxonomy to describe software weaknesses and vulnerabilities. Such an organization will help the community to: a) more closely explain the nature of
Fuzz Testing, or fuzzing, is a software testing technique that involves providing invalid, unexpected, or random test inputs to the software system under test. The system is then monitored for crashes and other undesirable behavior. Fuzz testing can be
Knowing what makes a software systems vulnerable to attacks is critical, as software vulnerabilities hurt security, reliability, and availability of the system as a whole. In addition, understanding how an adversary operates is essential to effective cyber
Static analysis testing of software source code is necessary but not sufficient. Over 40 percent of the Common Weakness Enumeration (CWE) are likely to be introduced in the architecture and design phase of the development life cycle. By their very nature
The Tcl interpreter is constantly being modified and improved. Improvements include new features and performance boosts. Everyone wants to use the latest releases with the newest improvements, but corporate users with large code bases may not be able to do
The Juliet Test Suite 1.1 is a collection of over 81,000 synthetic C/C++ and Java programs with known flaws. These programs are useful as test cases for testing the effectiveness of static analyzers and other software assurance tools, and are in the public
Just as seat belt use is wide spread, we argue that the use static analysis should be part of ethical software development. We explain some of the procedures of the four Static Analysis Tool Expositions (SATE), and some of the lessons we learned
Software Assurance Metrics And Tool Evaluation (SAMATE) is a broad, inclusive project at the U.S. National Institute of Standards and Technology (NIST) with the goal of improving software assurance by developing materials, specifications, and methods to
Julien M. Amelot, Ya-Shian Li-Baboud, Clement Vasseur, Jeffrey Fletcher, Dhananjay Anand, James Moyne
The numerous time synchronization performance requirements in the Smart Grid entails the need for a set of common metrics and test methods to verify the ability of the network system and its components to meet the power industry's accuracy, reliability and
This manual is a maintainers manual for the NIST DMIS Test Suite, version 2.2.1. DMIS (Dimensional Measuring Interface Standard) is a language for writing programs for coordinate measuring machines and other dimensional measurement equipment. The manual is
This manual is a system builders manual for the NIST DMIS Test Suite, version 2.2.1. DMIS (Dimensional Measuring Interface Standard) is a language for writing programs for coordinate measuring machines and other dimensional measurement equipment. The
This manual is a users manual for the NIST DMIS Test Suite, version 2.2.1. DMIS (Dimensional Measuring Interface Standard) is a language for writing programs for coordinate measuring machines and other dimensional measurement equipment. The manual
John V. Messina, Matthew L. Aronoff, Eric D. Simmon
New and potentially disruptive technologies are constantly being introduced into the electronic interconnection industry as companies seek to improve their manufacturing chain and stay competitive. These new technologies do not exist in a vacuum and must
Software assurance tools examine code for problems. To test such tools, we need programs with known bugs as ground truth. The Software Assurance Reference Dataset (SARD) is a publicly accessible collection of over 100,000 test cases in different