2010 HCSS Conference Program Agenda

2010 PROGRAM AGENDA

 

  MONDAY, MAY 10 TUESDAY, MAY 11 WEDNESDAY, MAY 12 THURSDAY, MAY 13
CAS Software Assurance Workshop
0830-0915 Guardol: A Domain-Specific Language for Guards
David Hardin, Rockwell Collins
Keynote Presentation: Alchemy: Three Ways of Transmutating Programs Into Circuits
Satnam Singh, MS Research - Cambridge, UK
Keynote Presentation:
Christopher Greer, OSTP
Towards Next-Generation of BitBlaze
Dawn Song, UC Berkeley
0915-0930 Automated Vulnerability Injection
Dan Guinlan, Lawrence-Livermore National Labs
0930-1000 BREAK BREAK
1000-1030 BREAK Replacing Testing with Formal Verification in Intel® Core i7™ Processor Execution Engine Validation
Roope Kaivola, Intel Corporation
Shifting the Paradigm
Ivan Sutherland, Portland State University
BREAK
1030-1045 L4.verified
Gerwin Klein, NICTA
CTRAD Project Briefing
Christina Smyre, Center for Assured Software, NSA
1045-1100 Centaur Verification Approach
Warren Hunt, University of Texas at Austin
Peter Lee, DARPA
1100-1130 Paul Wetzel, OPS Consulting
1130-1200 LUNCH LUNCH LUNCH
1200-1300 LUNCH
1300-1330 Dean Collins, DARPA Revolution Through Competition?
Carl Landwehr, NSF
Moving Secure Software Assurance into Higher Education: A Roadmap for Social Change
Dan Showmaker, University of Detroit, Mercy
1330-1345 Keynote Presentation: The Next IDE - Informative Development Environments
Gina Venolia, Microsoft Research
1345-1415 Proof-Carrying Data: Secure Computation on Untrusted Execution Platforms
Eran Tromer, MIT
BREAK CAS Source Code Analysis Tool Testing Project John Laliberte, Mandiant
1415-1430 Helen Gill, NSF
1430-1500 BREAK BREAK BREAK
1500-1545 Visualizing Information Flow Through C Programs
Joe Hurd, Galois
Generating Implementations of Error Correcting Codes Using Kansas Lava
Andy Gill, University of Kansas
Virtual Organization for Cyber-Physical Systems (CPS-VO): Goals, Plans and Actions
Janos Sztipanovits, ISIS - Vanderbilt University
Static Analysis Tool Exposition and Reality
Paul Black, NIST
1545-1630 VAST: Visulization of Attack Surfaces for Targeting
Ke-Thia Yao, University of Southern California
Formal Models of ARM Processors in HOL
Michael Gordon and Anthony Fox, University of Cambridge
Security Systems Engineering
Jennifer Bayuk, Stevens Institute of Technology
CAS Assurance Scoring and Validation Projects
Chuck Willis, Mandiant
1630-1715 Using Java PathFinder for Program Understanding and Defect Visualization
Peter Mehlitz, NASA Ames
HWMAC: Hardware-Enforced Fine-Grained Policy-Driven Security
Paul Karger, IBM Corporation
Adjourn for the day Closing Remarks
1715

Adjourn for the day

 

Adjourn for the day

 

Adjourn for the day