2018 Program Agenda

 

DOWNLOAD PRINTER-FRIENDLY VERSION

2018 DAILY AGENDA

  MONDAY, MAY 7
Trusting Autonomy
TUESDAY, MAY 8
Complex Heterogeneous Systems
 
WEDNESDAY, MAY 9
Blockchain
 
0900 - 1000 Keynote Presentation:
Assured Autonomy
Sandeep Neema (DARPA)
Keynote Presentation:
A Four Pillar Improvement Strategy to Qualification of Embedded Software Systems
Peter H. Feiler (SEI)
Keynote Presentation:
Challenges Ahead for Blockchains
Emin Gün Sirer (Cornell)
1000 - 1030 Data-driven Safe Control of Nonlinear Systems
Susmit Jha
(SRI International)
Perspectives on Applying the Safety Case Approach for the Assurance of Complex Heterogeneous Systems
Ewen Denney
(SGT / NASA Ames)
On the Emerging Trend of Computer-Aided Cryptology and the Technology Transition Gap it Presents 
Evan Austin 
(SPAWAR Systems Center Atlantic)
1030 - 1100
BREAK
 
BREAK BREAK
1100 - 1130 Using Formal Methods to Reason About Neural Network Based Autonomous Systems
Stephen Magill
(Galois, Inc.)
Principles of Layered Attestation
Paul Rowe
(The MITRE Corporation)
Applying Symbolic Execution to Blockchain Applications
Mark Mossberg
(Trail of Bits)
1130 - 1145 Towards Formally Verified Deep Neural Networks
Clark Barrett
(Stanford University)
Architecture-Driven Assurance for Model-Based Systems Engineering
Darren Cofer
(Rockwell Collins)
1145 - 1200 Resilient and Trustworthy Transactive Platform for Smart and Connected Communities 
Aron Laszka 
(University of Houston)
1200 - 1215 LUNCH
(on your own)
LUNCH
(on your own)
1215 - 1245 Case Study: Verifying Safety of a UUV Heading PID Controller
Daniel Genin
(JHU APL)
1245 - 1330
Confernence Adjourned
1330 - 1415 Invited Presenter:
Growing Risk of Cyber Attacks
Vinh Nguyen (ODNI)
Invited Presenter:
The Future of Cyber-autonomy
David Brumley (ForAllSecure / CMU)
1415 - 1500

 

POSTER SESSION / BREAK

 

 

POSTER SESSION / BREAK

 

1500 - 1530 Intrusion and Anomaly Detection in Autonomous Vehicle Systems
Sam Lauzon (University of Michigan - Transportation Research Institute)
Model-based System Certification –
A Vision
Jérôme Hugues (ISAE Supaero)
1530 - 1600 The KeYmaera X Theorem Prover: Hybrid Systems Verification and Verified Runtime Validation
Stefan Mitsch
(CMU)
VeriCores: Cyber-Instrumenting Devices Built from Verified Components 
David Hardin 
(Rockwell Collins)
1600 - 1630 Safe Pointers and Verifiable Automatic Heap Management without Garbage Collection
S. Tucker Taft
(AdaCore)
High-Assurance Blockchains: Applications and Verification
Joe Hendrix
(Galois, Inc)
1630 Adjourn for the Day

Adjourn for the Day

 

1830
Conference Dinner

The Chart House
300 2nd Street
Annapolis, MD 21403