2011 HCSS Conference Program Agenda

 

2011 PROGRAM AGENDA

  MONDAY, MAY 2 TUESDAY, MAY 3 
Evidence
WEDNESDAY, MAY 4 
Cyber-Physical Systems
THURSDAY, MAY 5 
Science of Security
FRIDAY, MAY 5 
HCSS/CAS Tools and Technologies
0830-0930   Keynote Presentation: Compiler Verification and Beyond: Verified Tools For High-Assurance Software 
Xavier Leroy, INRIA
Keynote Presentation: Time for High-Confidence Software Systems 
Edward A. Lee, UC Berkeley
Keynote Presentation: More WINE, Less Dahusian Research 
Marc Dacier, Symantec Research Labs - Europe
Keynote Presentation: Security Inception 
Jeff Williams, Aspect Security
0930-1000 BREAK BREAK BREAK BREAK
1000-1040 Verified Compiler Technology and Separation Logic for Reasoning about Concurrent C Programs 
Andrew Appel, Princeton University
Keynote Presentation: Wireless Control Networks: Modeling, Synthesis, Robustness, Security 
George Pappas, University of Pennsylvania
Dynamic Enforcement of Knowledge-Based Security Policies 
Stephen Magill, University of Maryland
Matching Logic 
Grigore Rosu, Universityof Illinois at Urbana-Champaign
1040-1050 Towards High-Assurance Run-Time Systems 
Andrew Tolmach, Portland State University
Enforcing Information Flow Policies Via Generation of Monitors in Java Card Runtime Environment 
Alessandro Coglio, Kestrel Institute
Analysis-Based Verification: A Programmer-Oriented Approach to the Assurance of Mechanical Program Properties 
Tim Halloran, Sure Logic
1050-1120 Applying Formal Methods to Prove Correctness of Surgical Robot Software 
Peter Kazanzides and Yanni Kouskoulas, Johns Hopkins University Applied Physics Lab
1120-1125 Using the Cambridge ARM Model to Verify the Concrete Machine Code of seL4 
Magnus Myreen, University of Cambridge
Moving-Target Defense With Configuration-Space Randomization 
Sanjai Narain, Telcordia
Automatically Identifying Exploitable Bugs 
David Brumley, Carnegie Mellon University
1125-1200 Verifying Timing-Centric Software Systems 
Sanjit Seshia, UC Berkeley
1200-1300

LUNCH

(on your own)

LUNCH

(on your own)

LUNCH

(on your own)

LUNCH

(on your own)

1300-1330 Cryptol Tutorial - Galois, Inc. 
Venue: The Maryland Inn
1330-1400 Let's Build Secure Systems on a Correct Kernel 
June Andronick, NICTA
Keynote Presentation: Making Sound Cyber Security Decisions Through a Quantitative Metrics Approach 
Bill Sanders, UIUC
Guardol: A Domain-Specific Language for Guards Supporting Strong Automated Formal Analysis 
Konrad Slind, Rockwell Collins
Software Vulnerabilities Precluded by SPARK 
Paul E. Black, NIST
1400-1415 CAS Static Analysis Tool Study Overview 
Chuck Willis, Mandiant
1415-1430 Developing Secure Mobile Architectures: The COTS Challenge 
Adam Wick, Galois
Information Security: The Legacy of a Maginot Line Cyberspace 
Doug DePeppe, i2IS Cyberspace Solutions
1430-1500 BREAK Panel: State of the Art om Software Assurance Static Analysis Technology 
Moderator: Kris Britton, NSA 
Panelists: Peter Henriksen (Coverity), Christien Rioux (Veracode), Tim Teitelbaum (GrammaTech), Jacob West (Fortify)
1500-1530 BREAK BREAK Using Symbolic Execution to Obtain Greater Automation & Flexibility for Checking Spark Software Contracts in Critical ES 
John Hatcliff, Kansas State University
BREAK
1530-1540 Cryptol Tutorial - Galois, Inc. 
Venue: The Maryland Inn
Proposed Formal Methods Supplement for RTCA DO 178C 
Jeff Joyce, Critical Systems Labs
The Open World Framework 
Sujata Millick, HP Labs
Conference Adjourned
1540-1615 Real-Time Runtime Monitoring 
Lee Pike, Galois
1615-1620 Parametric Verification of Address Space Separation 
Jason Franklin, Carnegie Mellon University
From Designed (Insecurity) to (Designed-In) Security 
Carl Landwehr, NSF
1620-1700 Making High-Confidence Systems Low-Cost 
Alex Dean, NC State
1700-1730 Adjourn for the day The CPS Virtual Organization 
Chris vanBuskirk, ISIS - Vanderbilt University
Adjourn for the day Adjourn for the day
1730

Adjourn for the day

 

1830 Conference Dinner 

The Chart House 
300 2nd Street 
Annapolis, MD 21403