High Assurance Rigorous Digital Engineering for Nuclear Safety (HARDENS) |
|
Analyzing Code Stability Using Control Theoretic Techniques |
|
Cyber Assured Systems Engineering at Scale |
|
Correct-by-Learning Methods for Reliable Control |
|
A Method for Formal Verification of Neural Network Collision Avoidance Controller |
|
Model-checking State Machines in the Wild |
|
Machine Learning and the Unknown Unknowns |
|
Keynote Presentation: Thomas Dullien |
|
Tiffin and MGen: An Expressive Policy Language with Multiple Runtime Monitoring Tools |
|
Model Validation for DARPA DPRIVE |
|
Lifting Formal Proof to Practice via an Assurance Case |
|
CSAADE: Cryptographically Secure, Automatic Assurance Software Development Environment |
|
Binary Software Composition Analysis with CodeSentry |
|
Keynote: What Log4j teaches us about the Software Supply Chain |
|
P: Formal Modeling and Analysis of Distributed Systems |
|
Reasoning about Deltas — Even Doing Nothing is Difficult |
|
Evolving Verified Cloud Authorization |
|
Automated Evidence Generation for Continuous Certification |
|
Lowering the Barrier to Formal Modeling and Analysis |
|
Proof, but at What Cost? |
|
Scaling Formal Verification with Specification Extraction |
|
Keynote Presentation: Supply Chain Events: Hardware vs. Software |
|
Unified Configuration Modeling Infrastructure |
|
Formally Verifying Security and Compliance Mandates using AWS Network Access Analyzer |
|