2010 HCSS Conference Program Agenda
2010 PROGRAM AGENDA
MONDAY, MAY 10 | TUESDAY, MAY 11 | WEDNESDAY, MAY 12 | THURSDAY, MAY 13 CAS Software Assurance Workshop |
|
0830-0915 | Guardol: A Domain-Specific Language for Guards David Hardin, Rockwell Collins |
Keynote Presentation: Alchemy: Three Ways of Transmutating Programs Into Circuits Satnam Singh, MS Research - Cambridge, UK |
Keynote Presentation: Christopher Greer, OSTP |
Towards Next-Generation of BitBlaze Dawn Song, UC Berkeley |
0915-0930 | Automated Vulnerability Injection Dan Guinlan, Lawrence-Livermore National Labs |
|||
0930-1000 | BREAK | BREAK | ||
1000-1030 | BREAK | Replacing Testing with Formal Verification in Intel® Core i7™ Processor Execution Engine Validation Roope Kaivola, Intel Corporation |
Shifting the Paradigm Ivan Sutherland, Portland State University |
BREAK |
1030-1045 | L4.verified Gerwin Klein, NICTA |
CTRAD Project Briefing Christina Smyre, Center for Assured Software, NSA |
||
1045-1100 | Centaur Verification Approach Warren Hunt, University of Texas at Austin |
Peter Lee, DARPA | ||
1100-1130 | Paul Wetzel, OPS Consulting | |||
1130-1200 | LUNCH | LUNCH | LUNCH | |
1200-1300 | LUNCH | |||
1300-1330 | Dean Collins, DARPA | Revolution Through Competition? Carl Landwehr, NSF |
Moving Secure Software Assurance into Higher Education: A Roadmap for Social Change Dan Showmaker, University of Detroit, Mercy |
|
1330-1345 | Keynote Presentation: The Next IDE - Informative Development Environments Gina Venolia, Microsoft Research |
|||
1345-1415 | Proof-Carrying Data: Secure Computation on Untrusted Execution Platforms Eran Tromer, MIT |
BREAK | CAS Source Code Analysis Tool Testing Project John Laliberte, Mandiant | |
1415-1430 | Helen Gill, NSF | |||
1430-1500 | BREAK | BREAK | BREAK | |
1500-1545 | Visualizing Information Flow Through C Programs Joe Hurd, Galois |
Generating Implementations of Error Correcting Codes Using Kansas Lava Andy Gill, University of Kansas |
Virtual Organization for Cyber-Physical Systems (CPS-VO): Goals, Plans and Actions Janos Sztipanovits, ISIS - Vanderbilt University |
Static Analysis Tool Exposition and Reality Paul Black, NIST |
1545-1630 | VAST: Visulization of Attack Surfaces for Targeting Ke-Thia Yao, University of Southern California |
Formal Models of ARM Processors in HOL Michael Gordon and Anthony Fox, University of Cambridge |
Security Systems Engineering Jennifer Bayuk, Stevens Institute of Technology |
CAS Assurance Scoring and Validation Projects Chuck Willis, Mandiant |
1630-1715 | Using Java PathFinder for Program Understanding and Defect Visualization Peter Mehlitz, NASA Ames |
HWMAC: Hardware-Enforced Fine-Grained Policy-Driven Security Paul Karger, IBM Corporation |
Adjourn for the day | Closing Remarks |
1715 |
Adjourn for the day
|
Adjourn for the day
|
Adjourn for the day
|