HCSS 2015 - Program Agenda

 

DOWNLOAD PRINTER-FRIENDLY VERSION

2015 DAILY AGENDA

  TUESDAY, MAY 5 
Proof Engineering
WEDNESDAY, MAY 6 
Sustainable Integrity 
 
THURSDAY, MAY 7 
Privacy 
 
0900 - 1000 Keynote Presentation: 
Proof Engineering: The Soft Side of Hard Proof 
Gerwin Klein (NICTA)
Keynote Presentation: 
Detecting Malice in Commodity Software 
Tim Fraser (DARPA)
Keynote Presentation: 
Building Privacy-Aware Computing Systems: An Overview of Current Capabilities and Technical Challenges 
Shantanu Rane (PARC)
1000 - 1030 Cerberus: Towards an Executable Semantics for Sequential and Concurrent C11 
Kayvan Memarian 
(University of Cambridge)
Remote Attestation for Cloud-Based Systems 
Perry Alexander 
(University of Kansas)
Reconciling Provable Security and Practical Cryptography: A Programming Language Perspective 
Gilles Barth (IMDEA)
1030 - 1100 BREAK BREAK POSTER SESSION
1100 - 1115 Verifiable C: proving functional correctness of C programs in Coq, e.g. SHA-256 and HMAC 
Andrew Appel (Princeton)
Biologically Inspired Software Defenses 
Michael Franz (UC Irvine)
1115 - 1130 A Cut Principle for Information Flow 
Joshua Guttman 
(The MITRE Corporation and WPI)
1130 - 1145 Deep Specifications and Certified Abstraction Layers 
Ronghui Gu (Yale)
Not-quite-so-broken TLS: Lessons in Re-engineering a Security Protocol Specification and Implementation 
David Kaloper Mersinjak 
(Univ. of Cambridge)
1145 - 1200 Models and Games for Quantifying Vulnerability of Secret Information 
Piotr Mardziel (University of MD)
1200 - 1215 LUNCH  
(on your own)
LUNCH 
(on your own)
1215 - 1330 LUNCH 
(on your own)
1330 - 1345 Qualification of Formal Methods Tools 
Darren Cofer (Rockwell Collins)
Rigorous Architectural Modelling for Production Multiprocessors 
Shaked Flur, Kathryn Gray, Christopher Pulte 
(University of Cambridge)
1345 - 1400 NSA Civil Liberties & Privacy: Bridging the Art and Science of Privacy 
Rebecca Richards (NSA)
1400 - 1430 Issues, Challenges and Opportunities in the Qualification of Formal Method Tools 
Cesare Tinelli (University of Iowa)
A Formal Specification of x86 Memory Management 
Shilpi Goel and Warren Hunt 
(UT Austin)
1430 - 1500 BREAK Language-based Hardware Verification with ReWire: Just Say No! to Semantic Archaeology 
William Harrison 
(University of Missouri)
High Assurance Cryptography Synthesis with Cryptol 
Joseph Kiniry (Galois)
1500 - 1530 Multi-Language and Multi-Prover Verification with SAWScript 
Aaron Tomb (Galois)
BREAK POSTER SESSION
1530 - 1545 CodeHawk: Sound Static Analysis for Proving the Absence of Memory Related Software Vulnerabilities 
Douglas Smith (Kestrel Technology)
Achieving High Speed and High Assurance in a Hardware-Based Cross-Domain System Using Guardol 
David Hardin (Rockwell Collins)
1545 - 1600 Privacy through Accountability 
Anupam Datta 
(Carnegie Mellon University)
1600 - 1630 Adjourn for the day Bringing Hardware Hacking to Life 
Colin O'Flynn (Dalhousie University)
1630 - 1700

Adjourn for the day

 

Private Disclosure of Information 
Daniel Aranki (UC Berkeley)
1700 Conference adjourned
1830

 

Conference Dinner 
 

The Chart House 
300 2nd Street 
Annapolis, MD 21401