Visible to the public 2011 HCSS Conference Program Agenda

2011 PROGRAM AGENDA

 

MONDAY, MAY 2

TUESDAY, MAY 3
Evidence

WEDNESDAY, MAY 4
Cyber-Physical Systems

THURSDAY, MAY 5
Science of Security

FRIDAY, MAY 5
HCSS/CAS Tools and Technologies

0830-0930  

Keynote Presentation: Compiler Verification and Beyond: Verified Tools For High-Assurance Software
Xavier Leroy, INRIA

Keynote Presentation: Time for High-Confidence Software Systems
Edward A. Lee, UC Berkeley
Keynote Presentation: More WINE, Less Dahusian Research
Marc Dacier, Symantec Research Labs - Europe
Keynote Presentation: Security Inception
Jeff Williams, Aspect Security
0930-1000

BREAK

BREAK BREAK BREAK
1000-1040

Verified Compiler Technology and Separation Logic for Reasoning about Concurrent C Programs
Andrew Appel, Princeton University

Keynote Presentation: Wireless Control Networks: Modeling, Synthesis, Robustness, Security
George Pappas, University of Pennsylvania
Dynamic Enforcement of Knowledge-Based Security Policies
Stephen Magill, University of Maryland
Matching Logic
Grigore Rosu, Universityof Illinois at Urbana-Champaign
1040-1050 Towards High-Assurance Run-Time Systems
Andrew Tolmach, Portland State University
Enforcing Information Flow Policies Via Generation of Monitors in Java Card Runtime Environment
Alessandro Coglio, Kestrel Institute
Analysis-Based Verification: A Programmer-Oriented Approach to the Assurance of Mechanical Program Properties
Tim Halloran, Sure Logic
1050-1120

Applying Formal Methods to Prove Correctness of Surgical Robot Software
Peter Kazanzides and Yanni Kouskoulas, Johns Hopkins University Applied Physics Lab

1120-1125

Using the Cambridge ARM Model to Verify the Concrete Machine Code of seL4
Magnus Myreen, University of Cambridge

Moving-Target Defense With Configuration-Space Randomization
Sanjai Narain, Telcordia
Automatically Identifying Exploitable Bugs
David Brumley, Carnegie Mellon University
1125-1200

Verifying Timing-Centric Software Systems
Sanjit Seshia, UC Berkeley

1200-1300

LUNCH

(on your own)

LUNCH

(on your own)

LUNCH

(on your own)

LUNCH

(on your own)

1300-1330 Cryptol Tutorial - Galois, Inc.
Venue: The Maryland Inn
1330-1400 Let's Build Secure Systems on a Correct Kernel
June Andronick, NICTA
Keynote Presentation: Making Sound Cyber Security Decisions Through a Quantitative Metrics Approach
Bill Sanders, UIUC

Guardol: A Domain-Specific Language for Guards Supporting Strong Automated Formal Analysis
Konrad Slind, Rockwell Collins

Software Vulnerabilities Precluded by SPARK
Paul E. Black, NIST
1400-1415 CAS Static Analysis Tool Study Overview
Chuck Willis, Mandiant
1415-1430 Developing Secure Mobile Architectures: The COTS Challenge
Adam Wick, Galois
Information Security: The Legacy of a Maginot Line Cyberspace
Doug DePeppe, i2IS Cyberspace Solutions
1430-1500 BREAK Panel: State of the Art om Software Assurance Static Analysis Technology
Moderator: Kris Britton, NSA
Panelists: Peter Henriksen (Coverity), Christien Rioux (Veracode), Tim Teitelbaum (GrammaTech), Jacob West (Fortify)
1500-1530 BREAK BREAK

Using Symbolic Execution to Obtain Greater Automation & Flexibility for Checking Spark Software Contracts in Critical ES
John Hatcliff, Kansas State University

BREAK
1530-1540 Cryptol Tutorial - Galois, Inc.
Venue: The Maryland Inn

Proposed Formal Methods Supplement for RTCA DO 178C
Jeff Joyce, Critical Systems Labs

The Open World Framework
Sujata Millick, HP Labs

Conference Adjourned

1540-1615

Real-Time Runtime Monitoring
Lee Pike, Galois

1615-1620

Parametric Verification of Address Space Separation
Jason Franklin, Carnegie Mellon University

From Designed (Insecurity) to (Designed-In) Security
Carl Landwehr, NSF
1620-1700 Making High-Confidence Systems Low-Cost
Alex Dean, NC State
1700-1730

Adjourn for the day

The CPS Virtual Organization
Chris vanBuskirk, ISIS - Vanderbilt University

Adjourn for the day

Adjourn for the day

1730

Adjourn for the day

 

1830

Conference Dinner

The Chart House

300 2nd Street
Annapolis, MD 21403