News

Team earns NASA award for Boeing, Embraer aircraft maintenance computer design

Two computer science professors and a doctoral student in computer science in the School of Engineering are members of a technical team that has received a 2011 Associate Administrator Award from the Aeronautics Research Mission Directorate of the National Aeronautics and Space Administration.

Jim Cooper, U.S. Congressman for Tennessee’s 5th District will be visiting ISIS on Monday, April 2, 2012.

Jim Cooper, U. S. Congressman for Tennessee's 5th District will be visiting ISIS on Monday, April 2, 2012.  Congressman Cooper serves on the Committee on Armed Services and the Tactical Air and Land Forces Subcommittee.

Article in Venture Nashville Connections by Doug Schmidt

IDEAS: Time to step-up local university-industry collaboration in Information Technologies, an article recently published in Venture Nashville Connections by Doug Schmidt, discusses the IT industry and the difficulty in finding, training, and retaining talented IT professionals in this region.  But, there are some opportunities to find local talent when collaborating with universities and industry leaders.  Dr.

Ted Bapty quoted in Popular Mechanics article on DARPA's cutting-edge plan for auto manufacturing

According to Popular Mechanics, DARPA, the defense research group, wants better vehicles.  They want them faster and cheaper.  In order to accomplish this feat, they are looking to computer circuit builders.

Sztipanovits quoted in Wall Street Journal article on software development

According to the Wall Street Journal, GE will announce a $1 billion investment in software development over three years as it seeks to use software to make many of its products smarter and more profitable, as well as developing products capable of solving problems for customers.

At the heart of the investment is a new global software headquarters the company is building in northern California. The facility, slated to be opened by the middle of next year in San Ramon, Calif., will hire 400 software engineers and centralize its world-wide efforts.

Lecture: BLOCK: A Black-box Approach for Detection of State Violation Attacks Towards Web Applications by Xiaowei Li

State violation attacks towards web applications exploit logic flaws and allow restrictive functions and sensitive information to be accessed at inappropriate states. Since application logic flaws are specific to the intended functionality of a particular web application, it is difficult to develop a general approach that addresses state violation attacks. To date, existing approaches all require web application source code for analysis or instrumentation in order to detect state violations. In this paper, we present BLOCK, a Black-box approach for detecting state violation attacks.