HCSS 2016 - Program Agenda

 

DOWNLOAD PRINTER-FRIENDLY VERSION

2016 DAILY AGENDA

  TUESDAY, MAY 10 
Reasoning / IP
WEDNESDAY, MAY 11 
Measuring Security
THURSDAY, MAY 12 
Uncertainty and Adaptive Systems
0900 - 1000 Keynote Presentation: 
Verification Across Intellectual Property Boundaries 
Sagar Chaki (CMU-SEI)
Keynote Presentation 
Metric or English: Characterizing and Conveying Trustworthiness 
Fred B. Schneider (Cornell)
Keynote Presentation: 
Programming Uncertain <T>hings 
Kathryn McKinley (Microsoft Research)
1000 - 1030 The Science of Deep Specification 
Benjamin Pierce (Penn)
Build It Break It Fix It: 
Measuring Secure Development 
Andrew Ruef (University of Maryland)
Formal Verification of C Programs with Floating-Point Computations: Certified Error Bounds 
for Signal Processing 
Tahina Ramananandro 
(Reservoir Labs Inc)
1030 - 1100 BREAK BREAK BREAK
1100 -  1130 Interrupts in OS code: 
let's reason about them. 
Yes, this means concurrency. 
June Andronick (Data61 and UNSW)
Measuring Protocol Strength 
with Security Goals 
Paul Rowe (The MITRE Corporation)
Wigmore: A Constraint-Based Language for Reasoning About Evidence and Uncertainty 
David Burke (Galois, Inc.)
1130 - 1200 Android Platform Modeling and Android App Verification 
in the ACL2 Theorem Prover 
Eric W. Smith (Kestrel Institute)
Combinatorial Coverage Analysis 
of Subsets of the TLS Cipher Suite Registry 
Dimitris Simos (SBA Research)
Formal Modeling and Analysis of Hierarchical Path Planning 
Cesare Tinelli (The University of Iowa)
1200 - 1330 LUNCH 
(on your own)
LUNCH 
(on your own)
LUNCH 
(on your own)
1330 - 1400 "It's QEDs All the Way Down" 
David Hardin (Rockwell Collins)
New Perspectives on Automated Vulnerability Discovery 
Artem Dinaburg (Trail of Bits)
Keynote Presentation: 
Data and Decision Analytics 
Robert Bonneau (OSD)
1400 - 1430 Moving Hardware from 
“Security through Obscurity” 
to “Secure by Design” 
Ryan Kastner (UCSD)
Gradual Information Flow Control 
Peter Thiemann (Universität Freiburg)
1430 - 1500 POSTER SESSION POSTER SESSION BREAK
1500 - 1530 Automatic Software Verification 
for High-Confidence 
Cyber-Physical Systems 
Miroslav Pajic (Duke University)
1530 - 1600 Learning State-Rich 
Specifications from "Big Code" 
Swarat Chaudhuri (Rice University)
TQL-1 Qualification of a Model-Based Code Generator 
S. Tucker Taft (AdaCore)
Safety-Constrained 
Reinforcement Learning for MDPs 
Nils Jansen (UT Austin)
1600 - 1630 A String, Regular Expression, 
and Integer Solver for Bug-finding and Security 
Yunhui Zheng (IBM)
Collaboration and Automation for 
Threat Assessment and Mitigation 
Dave Archer (Galois, Inc.)

Confernence Adjourned
1630 Adjourn for the day

Adjourn for the day

 

1830 Conference Dinner 

The Chart House 
300 2nd Street 
Annapolis, MD 21403