HCSS Conference 2026 – Poster/Demo Sessions
Monday – Poster/Demo Session
Theme: AI as an Enabler
| Comparing the Cognitive Vulnerabilities of Human and AI-based Penetration Testers Hajime Inoue and Zak Fry (GrammaTech) |
| From Firmware Analysis Outputs to Assurance Artifacts: Evidence-Driven Workflows in REAFFIRM Christopher Wright (GrammaTech) |
| From Language to Logic: VLM-Grounded Safe Navigation in Novel Environments Kristy Sakano and Kalonji Harrington (University of Maryland College Park) |
| Lessons Learned from Formal Verification of Lattice-Based Post-Quantum Cryptography in Software: From C to Rust Reza Azarderakhsh (FAU and PQSecure) |
| Safe Integration of AI for Cryptographic Protocol Analysis Lauren Brandt (MITRE) |
| Towards Autoformalization of LLM-Generated Outputs for Requirement Verification Mihir Gupte and Ramesh S. (General Motors) |
| Trustworthy Autonomy: Logic Meets Learning for Safety-Critical Systems Aniruddh Puranic (University of Maryland College Park) |
| Vibes to Verification Balaji Rao (Stevens Institute of Technology) |
Theme: Beyond AI
| STORM–Mission Assurance and System Security Engineering Methodology for Trustworthy Systems with AI Shiu-Kai Chin and Jae Oh (Syracuse University) |
Wednesday – Poster/Demo Session
Theme: Beyond AI
| The ARCOS Tool Portal: An Enabling Infrastructure for Hands-On Software Assurance Tools Exploration Yogesh Barve and Katie Dey (Vanderbilt University) |
| Cyber knowledge representation for collaborative tiered cyber-reasoning Gregory Briskin (Trusted Science and Technology) |
| Establishing Trust in Hidden Communication Systems Olivier Savary Bélanger (Galois), John Cyphert (STR), and Kevin Batz (Cornell University) |
| Modeling and Analysis of Weird Networks using Probabilistic Timed Automata Ian Blumenfeld, Andrew Chen, Andrew Choe, Yakir Forman, Manasvi Parikh, Lucas Peña, Kyle Treubig, Paul Vines, Jared Ziegler (Two Six Technologies) Adam Mendenhall, Thomas Wahl (Trusted Science and Technology) |
| Quantifying Side Channel Leakage with Probabilistic Abstract Interpretation Keara Hill (Binghamton University) |
Theme: Hardware Security
| Combinatorial Methods for Functional Verification and Hardware Vulnerability Detection M S Raunak and Rick Kuhn (National Institute of Standards and Technology (NIST)) |
![]()