2012 HCSS Conference Program Agenda
DOWNLOAD PRINTER-FRIENDLY VERSION | DOWNLOAD PROCEEDINGS BOOKLET
2012 DAILY AGENDA
TUESDAY, MAY 8 |
WEDNESDAY, MAY 9 |
THURSDAY, MAY 10 |
FRIDAY, MAY 11 |
|
0830-0900 |
Formal Methods & DO-178C |
Keynote Presentation: Program Synthesis for Performance |
Keynote Presentation: A New Approach to Temporal Property Verification |
Designed-In Security in Context |
0900-0930 |
Keynote Presentation: Ensuring System Resilience at Design Time: A User and Attacker Oriented Approach |
|||
0930-1000 |
BREAK/ POSTER SESSION |
BREAK |
|
|
1000-1030 |
Accessible Integrated Formal Reasoning Environments in Classroom Instruction of Mathematics |
Preventing Exploits Against Software of Uncertain Provenance |
Keynote Presentation: The Ramify Rule of Separation Logic: Compositional Reasoning for Sharing |
BREAK/ POSTER SESSION |
1030-1040 | Lessons From Twenty Years of Industrial Formal Methods Steve Miller, Rockwell Collins |
|||
1040-1115 | Structured Orchestration of Data and Computation Jayadev Misra, University of Texas at Austin |
VIBRANCE: Automatic Removal of Security Vulnerabilities from Java Applications |
Verification of Elliptic Curve Cryptography Joe Hendrix, Galois |
|
1115-1120 | Designing for the Human Element in Security Angela Sasse, University College London |
|||
1120-1200 | Compositional Verification of Architectural Models Darren Cofer, Rockwell Collins |
Axe: An Automated Formal Equivalence Checking Tool for Programs Eric Smith, Kestrel Institute |
||
1200-1330 |
LUNCH |
LUNCH | LUNCH | LUNCH |
1330-1410 | Keynote Presentation: Technology Transfer Challenges Within the S&T Community Dawn Meyerriecks, ODNI |
Formal Synthesis of Efficient Verified Emulators |
Reasoning About Non-Determinism in Programs |
Keynote Presentation: A Look at Designed-In Security Needs and Preliminary Successes Bill Scherlis, Carnegie Mellon University |
1410-1430 |
Synthesizing Architectural Models of Cyber-Physical Systems |
FUSE: Inter-Application Security for Android |
||
1430-1450 | BREAK | BREAK | ||
1450-1500 | Static Previrtualization Natarajan Shankar and Ashish Gehani, SRI International |
Framework for Evaluating Information Flows in Multicore Architectures for High Assurance Systems |
||
1500-1530 | Tech Transfer of Software Tools Jim Larus, Microsoft Research |
Role of Domain-Specific Techniques in Designed-In Security |
||
1530-1545 | BREAK/ POSTER SESSION | BREAK | ||
1545-1600 |
VehicleForge.mil: A Distributed Semantically-Aware Framework to Support the Needs of the Open Hardware Community |
Designed-In Security for Mobile Applications Jonathan Aldrich, Carnegie Mellon University |
||
1600-1630 |
Synthesis of Concurrent Garbage Collectors |
Software Model Checking Secure Systems Limin Jia, Carnegie Mellon University |
||
1630-1640 | Open Discussion on Technology Transfer | High Assurance Cyber Military Systems: A New DARPA Program Kathleen Fisher, DARPA |
Margrave: Query-Based Policy Analysis |
|
1640-1700 | 3 Years After L.4 Verified Gerwin Klein, NICTA and UNSW |
|||
1700 |
Adjourn for the day |
|||
1715 |
Conference Adjourned |
|||
1730 |
Adjourn for the day
|
Adjourn for the day |
||
1830 |
Conference Dinner |