2012 HCSS Conference Program Agenda
DOWNLOAD PRINTER-FRIENDLY VERSION
2012 DAILY AGENDA
TUESDAY, MAY 8 Technology Transfer |
WEDNESDAY, MAY 9 Formal Synthesis |
THURSDAY, MAY 10 Compositional Reasoning |
FRIDAY, MAY 11 Design-In Security |
|
0830-0900 | Formal Methods & DO-178C Darren Cofer, Rockwell Collins |
Keynote Presentation: Program Synthesis for Performance Markus PĆ¼schel, ETH Zurich |
Keynote Presentation: A New Approach to Temporal Property Verification Byron Cook, Microsoft Research |
Designed-In Security in Context Carl Landwehr, Cyber Security Policy and Research Institute |
0900-0930 | Keynote Presentation: Ensuring System Resilience at Design Time: A User and Attacker Oriented Approach William Sanders, University of Illinois Urbana-Champaign |
|||
0930-1000 |
|
|
BREAK |
|
1000-1030 | Accessible Integrated Formal Reasoning Environments in Classroom Instruction of Mathematics Andrei Lapets |
Preventing Exploits Against Software of Uncertain Provenance David Melski, GrammaTech |
Keynote Presentation: The Ramify Rule of Separation Logic: Compositional Reasoning for Sharing Jules Villard, University College London |
|
1030-1040 | Lessons From Twenty Years of Industrial Formal Methods Steve Miller, Rockwell Collins |
|||
1040-1115 | Structured Orchestration of Data and Computation Jayadev Misra, University of Texas at Austin |
VIBRANCE: Automatic Removal of Security Vulnerabilities from Java Applications Alessandro Coglio, Kestrel Institute |
Verification of Elliptic Curve Cryptography Joe Hendrix, Galois |
|
1115-1120 | Designing for the Human Element in Security Angela Sasse, University College London |
|||
1120-1200 | Developer-Friendly Contract-Based Notations and Machine-Checkable Evidence for Verification of Information Flow Properties for Embedded Systems John Hatcliff |
Compositional Verification of Architectural Models Darren Cofer, Rockwell Collins |
|
|
1200-1330 | LUNCH | LUNCH | LUNCH | LUNCH |
1330-1410 | Keynote Presentation: Technology Transfer Challenges Within the S&T Community Dawn Meyerriecks, ODNI |
Formal Synthesis of Efficient Verified Emulators Magnus Myreen, University of Cambridge |
Reasoning About Non-Determinism in Programs Eric Koskinen, University of Cambridge and New York University |
Keynote Presentation: A Look at Designed-In Security Needs and Preliminary Successes Bill Scherlis, Carnegie Mellon University |
1410-1430 | Synthesizing Architectural Models of Cyber-Physical Systems Pete Manolios, Northeatern University |
FUSE: Inter-Application Security for Android Joe Hurd, Galois |
||
1430-1450 | BREAK | BREAK | ||
1450-1500 | Static Previrtualization Natarajan Shankar and Ashish Gehani, SRI International |
Framework for Evaluating Information Flows in Multicore Architectures for High Assurance Systems Ryan Bradetich, University of Idaho |
||
1500-1530 | Tech Transfer of Software Tools Jim Larus, Microsoft Research |
Role of Domain-Specific Techniques in Designed-In Security John Launchbury, Galois |
||
1530-1545 | BREAK/ POSTER SESSION | BREAK | ||
1545-1600 | VehicleForge.mil: A Distributed Semantically-Aware Framework to Support the Needs of the Open Hardware Community Jack Zentner, Georgia Tech |
Designed-In Security for Mobile Applications Jonathan Aldrich, Carnegie Mellon University |
||
1600-1630 | Synthesis of Concurrent Garbage Collectors Douglas Smith, Kestrel Institute |
Software Model Checking Secure Systems Limin Jia, Carnegie Mellon University |
||
1630-1640 | Open Discussion on Technology Transfer | High Assurance Cyber Military Systems: A New DARPA Program Kathleen Fisher, DARPA |
Margrave: Query-Based Policy Analysis Dan Dougherty, Worcester Polytechnic Institute |
|
1640-1700 | 3 Years After L.4 Verified Gerwin Klein, NICTA and UNSW |
|||
1700 | Adjourn for the day | |||
1715 | Conference Adjourned | |||
1730 |
Adjourn for the day
|
Adjourn for the day | ||
1830 | Conference Dinner The Chart House 300 2nd Street Annapolis, MD 21403 |