Visible to the public 2010 HCSS Conference Program Agenda

2010 PROGRAM AGENDA
 
 

MONDAY, MAY 10

TUESDAY, MAY 11

WEDNESDAY, MAY 12

THURSDAY, MAY 13
CAS Software Assurance Workshop

0830-0915 Guardol: A Domain-Specific Language for Guards
David Hardin, Rockwell Collins
Keynote Presentation: Alchemy: Three Ways of Transmutating Programs Into Circuits
Satnam Singh, MS Research - Cambridge, UK
Keynote Presentation:
Christopher Greer, OSTP
Towards Next-Generation of BitBlaze
Dawn Song, UC Berkeley
0915-0930

Automated Vulnerability Injection
Dan Guinlan, Lawrence-Livermore National Labs

0930-1000 BREAK BREAK
1000-1030 BREAK

Replacing Testing with Formal Verification in Intel® Core i7™ Processor Execution Engine Validation
Roope Kaivola, Intel Corporation

Shifting the Paradigm
Ivan Sutherland, Portland State University
BREAK
1030-1045 L4.verified
Gerwin Klein, NICTA
CTRAD Project Briefing
Christina Smyre, Center for Assured Software, NSA
1045-1100

Centaur Verification Approach
Warren Hunt, University of Texas at Austin

Peter Lee, DARPA
1100-1130

Paul Wetzel, OPS Consulting

1130-1200

LUNCH

LUNCH LUNCH
1200-1300 LUNCH
1300-1330 Dean Collins, DARPA Revolution Through Competition?
Carl Landwehr, NSF

Moving Secure Software Assurance into Higher Education: A Roadmap for Social Change
Dan Showmaker, University of Detroit, Mercy

1330-1345 Keynote Presentation: The Next IDE - Informative Development Environments
Gina Venolia, Microsoft Research
1345-1415

Proof-Carrying Data: Secure Computation on Untrusted Execution Platforms
Eran Tromer, MIT

BREAK CAS Source Code Analysis Tool Testing Project John Laliberte, Mandiant
1415-1430 Helen Gill, NSF
1430-1500

BREAK

BREAK BREAK
1500-1545 Visualizing Information Flow Through C Programs
Joe Hurd, Galois
Generating Implementations of Error Correcting Codes Using Kansas Lava
Andy Gill, University of Kansas

Virtual Organization for Cyber-Physical Systems (CPS-VO): Goals, Plans and Actions
Janos Sztipanovits, ISIS - Vanderbilt University

Static Analysis Tool Exposition and Reality
Paul Black, NIST
1545-1630

VAST: Visulization of Attack Surfaces for Targeting
Ke-Thia Yao, University of Southern California

Formal Models of ARM Processors in HOL
Michael Gordon and Anthony Fox, University of Cambridge
Security Systems Engineering
Jennifer Bayuk, Stevens Institute of Technology
CAS Assurance Scoring and Validation Projects
Chuck Willis, Mandiant
1630-1715

Using Java PathFinder for Program Understanding and Defect Visualization
Peter Mehlitz, NASA Ames

HWMAC: Hardware-Enforced Fine-Grained Policy-Driven Security
Paul Karger, IBM Corporation

Adjourn for the day

Closing Remarks
1715

Adjourn for the day

 

Adjourn for the day

 

Adjourn for the day