Visible to the public 2018 Program Agenda

DOWNLOAD PRINTER-FRIENDLY VERSION | DOWNLOAD PROCEEDINGS BOOKLET

2018 DAILY AGENDA

 

MONDAY, MAY 7
Trusting Autonomy

TUESDAY, MAY 8
Complex Heterogeneous Systems

 

WEDNESDAY, MAY 9
Blockchain

 

0900 - 1000

Keynote Presentation:
Assured Autonomy
Sandeep Neema (DARPA)

Keynote Presentation:
A Four Pillar Improvement Strategy to Qualification of Embedded Software Systems
Peter H. Feiler (SEI)

Keynote Presentation:
Challenges Ahead for Blockchains
Emin Gün Sirer (Cornell)

1000 - 1030

Data-driven Safe Control of Nonlinear Systems
Susmit Jha
(SRI International)

Perspectives on Applying the Safety Case Approach for the Assurance of Complex Heterogeneous Systems
Ewen Denney
(SGT / NASA Ames)

On the Emerging Trend of Computer-Aided Cryptology and the Technology Transition Gap it Presents 
Evan Austin 
(SPAWAR Systems Center Atlantic)

1030 - 1100
BREAK
 
BREAK BREAK
1100 - 1130

Using Formal Methods to Reason About Neural Network Based Autonomous Systems
Stephen Magill
(Galois, Inc.)

Principles of Layered Attestation
Paul Rowe
(The MITRE Corporation)

Applying Symbolic Execution to Blockchain Applications
Mark Mossberg
(Trail of Bits)
1130 - 1145

Towards Formally Verified Deep Neural Networks
Clark Barrett
(Stanford University)

Architecture-Driven Assurance for Model-Based Systems Engineering
Darren Cofer
(Rockwell Collins)

1145 - 1200

Resilient and Trustworthy Transactive Platform for Smart and Connected Communities 
Aron Laszka 
(University of Houston)

1200 - 1215 LUNCH
(on your own)
LUNCH
(on your own)
1215 - 1245

Case Study: Verifying Safety of a UUV Heading PID Controller
Daniel Genin
(JHU APL)

1245 - 1330
Confernence Adjourned
1330 - 1415

Invited Presenter:
Growing Risk of Cyber Attacks
Vinh Nguyen (ODNI)

Invited Presenter:
The Future of Cyber-autonomy

David Brumley (ForAllSecure / CMU)
1415 - 1500

 

POSTER SESSION / BREAK

 

 

POSTER SESSION / BREAK

 

1500 - 1530

Intrusion and Anomaly Detection in Autonomous Vehicle Systems
Sam Lauzon (University of Michigan - Transportation Research Institute)

Model-based System Certification –
A Vision

Jérôme Hugues (ISAE Supaero)

1530 - 1600

The KeYmaera X Theorem Prover: Hybrid Systems Verification and Verified Runtime Validation
Stefan Mitsch
(CMU)

VeriCores: Cyber-Instrumenting Devices Built from Verified Components 
David Hardin 
(Rockwell Collins)

1600 - 1630

Safe Pointers and Verifiable Automatic Heap Management without Garbage Collection
S. Tucker Taft
(AdaCore)

High-Assurance Blockchains: Applications and Verification
Joe Hendrix
(Galois, Inc)

1630

Adjourn for the Day

Adjourn for the Day

 

1830
Conference Dinner

The Chart House

300 2nd Street
Annapolis, MD 21403