2012 HCSS Conference Program Agenda


DOWNLOAD PRINTER-FRIENDLY VERSION

2012 DAILY AGENDA


  TUESDAY, MAY 8 
Technology Transfer
WEDNESDAY, MAY 9 
Formal Synthesis
THURSDAY, MAY 10 
Compositional Reasoning
FRIDAY, MAY 11 
Design-In Security
0830-0900 Formal Methods & DO-178C 
Darren Cofer, Rockwell Collins
Keynote Presentation: Program Synthesis for Performance 
Markus Püschel, ETH Zurich
Keynote Presentation: A New Approach to Temporal Property Verification 
Byron Cook, Microsoft Research
Designed-In Security in Context 
Carl Landwehr, Cyber Security Policy and Research Institute
0900-0930 Keynote Presentation: Ensuring System Resilience at Design Time: A User and Attacker Oriented Approach 
William Sanders, University of Illinois Urbana-Champaign
0930-1000


BREAK/ POSTER SESSION 
 


BREAK 
 

BREAK

1000-1030 Accessible Integrated Formal Reasoning Environments in Classroom Instruction of Mathematics 
Andrei Lapets
Preventing Exploits Against Software of Uncertain Provenance 
David Melski, GrammaTech
Keynote Presentation: The Ramify Rule of Separation Logic: Compositional Reasoning for Sharing 
Jules Villard, University College London


BREAK/ POSTER SESSION 
 

1030-1040 Lessons From Twenty Years of Industrial Formal Methods 
Steve Miller, Rockwell Collins
1040-1115 Structured Orchestration of Data and Computation 
Jayadev Misra, University of Texas at Austin
VIBRANCE: Automatic Removal of Security Vulnerabilities from Java Applications 
Alessandro Coglio, Kestrel Institute
Verification of Elliptic Curve Cryptography 
Joe Hendrix, Galois
1115-1120 Designing for the Human Element in Security 
Angela Sasse, University College London
1120-1200 Developer-Friendly Contract-Based Notations and Machine-Checkable Evidence for Verification of Information Flow Properties for Embedded Systems 
John Hatcliff
Compositional Verification of Architectural Models 
Darren Cofer, Rockwell Collins


Axe: An Automated Formal Equivalence Checking Tool for Programs 
Eric Smith, Kestrel Institute

1200-1330 LUNCH LUNCH LUNCH LUNCH
1330-1410 Keynote Presentation: Technology Transfer Challenges Within the S&T Community 
Dawn Meyerriecks, ODNI
Formal Synthesis of Efficient Verified Emulators 
Magnus Myreen, University of Cambridge
Reasoning About Non-Determinism in Programs 
Eric Koskinen, University of Cambridge and New York University
Keynote Presentation: A Look at Designed-In Security Needs and Preliminary Successes 
Bill Scherlis, Carnegie Mellon University
1410-1430 Synthesizing Architectural Models of Cyber-Physical Systems 
Pete Manolios, Northeatern University
FUSE: Inter-Application Security for Android 
Joe Hurd, Galois
1430-1450 BREAK BREAK
1450-1500 Static Previrtualization 
Natarajan Shankar and Ashish Gehani, SRI International
Framework for Evaluating Information Flows in Multicore Architectures for High Assurance Systems 
Ryan Bradetich, University of Idaho
1500-1530 Tech Transfer of Software Tools 
Jim Larus, Microsoft Research
Role of Domain-Specific Techniques in Designed-In Security 
John Launchbury, Galois
1530-1545 BREAK/ POSTER SESSION BREAK
1545-1600 VehicleForge.mil: A Distributed Semantically-Aware Framework to Support the Needs of the Open Hardware Community 
Jack Zentner, Georgia Tech
Designed-In Security for Mobile Applications 
Jonathan Aldrich, Carnegie Mellon University
1600-1630 Synthesis of Concurrent Garbage Collectors 
Douglas Smith, Kestrel Institute
Software Model Checking Secure Systems 
Limin Jia, Carnegie Mellon University
1630-1640 Open Discussion on Technology Transfer High Assurance Cyber Military Systems: A New DARPA Program 
Kathleen Fisher, DARPA
Margrave: Query-Based Policy Analysis 
Dan Dougherty, Worcester Polytechnic Institute
1640-1700 3 Years After L.4 Verified 
Gerwin Klein, NICTA and UNSW
1700 Adjourn for the day
1715 Conference Adjourned
1730

Adjourn for the day

 

Adjourn for the day
1830 Conference Dinner 

The Chart House 
300 2nd Street 
Annapolis, MD 21403