EDT |
MON, SEPT 14 |
TUES, SEPT 15 |
WED, SEPT 16 |
THUR, SEPT 17 |
1100 - 1145 |
PANEL |
KEYNOTE |
PANEL |
KEYNOTE |
1145 - 1200 |
Run-Time Assurance Architecture for Learning-Enabled Systems |
|||
1200 - 1215 |
Kim Ferguson-Walter |
Integration Challenges in Static Analysis and Verification |
Geometric Path Enumeration Methods for Verification of Neural Networks |
|
1215 - 1230 | BREAK | |||
1230 - 1245 |
BREAK |
BREAK |
BREAK |
|
1245 - 1300 | ||||
1300 - 1315 |
KEYNOTE |
|||
1315 - 1330 | David Burke (Galois)
|
Formal Verification of Production Distributed Protocols |
Scaling Continuous Verification of Cryptography Joey Dodds (Galois) |
|
1330 - 1345 | Actionable definition of Safety Design Patterns using AADLv2, ALISA and the Error Modeling Annex Jerome Hugues (CMU/SEI) |
|||
1345 - 1400 |
Verifying C++ at Scale |
End-to-End Verification of Initial and Transition Properties of GR(1) Designs Generated by Salty in SPARK |
||
1400 - 1415 | BREAK | TBA | ||
1415 - 1430 | Analysis of the Secure Remote Password Protocol Using CPSA Alan Sherman (UMBC) |
Scalable Sound Static Analysis of Real-world C Applications using Abstract Interpretation Henny Sipma (Kestrel Technology) |
||
1430 - 1445 | KEYNOTE Architecture-Level FM Konrad Slind (Collins Aerospace) |
|||
1445 - 1500 | BREAK | BREAK | BREAK | |
1500 - 1515 | ||||
1515 - 1530 | ||||
1530 - 1545 | A Verified Optimizer for Quantum Circuits Robert Rand (University of Maryland) |
POSTER SESSION
|
Interactive Conversion of C to Checked C Mike Hicks (Correct Computation Inc. / University of Maryland) |
One-click Automated Reasoning in Amazon Web Services |
1545 - 1600 | ||||
1600 - 1615 | Cryptographic Protocol Verification in AWS Adam Petcher (Amazon Web Services) |
Adapting to demand: seL4 proofs and proof engineering practice |
Code-Level Model Checking in the Software Development Workflow Daniel Schwartz-Narbonne (Amazon) |
|
1615 - 1630 | ||||
1630 - 1645 | Networking | Networking | Networking | Networking |
1645 - 1700 |
2020 Program Agenda