HCSS 2016 - Program Agenda
DOWNLOAD PRINTER-FRIENDLY VERSION
2016 DAILY AGENDA
TUESDAY, MAY 10 Reasoning / IP |
WEDNESDAY, MAY 11 Measuring Security |
THURSDAY, MAY 12 Uncertainty and Adaptive Systems |
|
0900 - 1000 | Keynote Presentation: Verification Across Intellectual Property Boundaries Sagar Chaki (CMU-SEI) |
Keynote Presentation Metric or English: Characterizing and Conveying Trustworthiness Fred B. Schneider (Cornell) |
Keynote Presentation: Programming Uncertain <T>hings Kathryn McKinley (Microsoft Research) |
1000 - 1030 | The Science of Deep Specification Benjamin Pierce (Penn) |
Build It Break It Fix It: Measuring Secure Development Andrew Ruef (University of Maryland) |
Formal Verification of C Programs with Floating-Point Computations: Certified Error Bounds for Signal Processing Tahina Ramananandro (Reservoir Labs Inc) |
1030 - 1100 | BREAK | BREAK | BREAK |
1100 - 1130 | Interrupts in OS code: let's reason about them. Yes, this means concurrency. June Andronick (Data61 and UNSW) |
Measuring Protocol Strength with Security Goals Paul Rowe (The MITRE Corporation) |
Wigmore: A Constraint-Based Language for Reasoning About Evidence and Uncertainty David Burke (Galois, Inc.) |
1130 - 1200 | Android Platform Modeling and Android App Verification in the ACL2 Theorem Prover Eric W. Smith (Kestrel Institute) |
Combinatorial Coverage Analysis of Subsets of the TLS Cipher Suite Registry Dimitris Simos (SBA Research) |
Formal Modeling and Analysis of Hierarchical Path Planning Cesare Tinelli (The University of Iowa) |
1200 - 1330 | LUNCH (on your own) |
LUNCH (on your own) |
LUNCH (on your own) |
1330 - 1400 | "It's QEDs All the Way Down" David Hardin (Rockwell Collins) |
New Perspectives on Automated Vulnerability Discovery Artem Dinaburg (Trail of Bits) |
Keynote Presentation: Data and Decision Analytics Robert Bonneau (OSD) |
1400 - 1430 | Moving Hardware from “Security through Obscurity” to “Secure by Design” Ryan Kastner (UCSD) |
Gradual Information Flow Control Peter Thiemann (Universität Freiburg) |
|
1430 - 1500 | POSTER SESSION | POSTER SESSION | BREAK |
1500 - 1530 | Automatic Software Verification for High-Confidence Cyber-Physical Systems Miroslav Pajic (Duke University) |
||
1530 - 1600 | Learning State-Rich Specifications from "Big Code" Swarat Chaudhuri (Rice University) |
TQL-1 Qualification of a Model-Based Code Generator S. Tucker Taft (AdaCore) |
Safety-Constrained Reinforcement Learning for MDPs Nils Jansen (UT Austin) |
1600 - 1630 | A String, Regular Expression, and Integer Solver for Bug-finding and Security Yunhui Zheng (IBM) |
Collaboration and Automation for Threat Assessment and Mitigation Dave Archer (Galois, Inc.) |
Confernence Adjourned |
1630 | Adjourn for the day |
Adjourn for the day
|
|
1830 | Conference Dinner The Chart House 300 2nd Street Annapolis, MD 21403 |