Visible to the public 2012 HCSS Conference Program Agenda

DOWNLOAD PRINTER-FRIENDLY VERSION | DOWNLOAD PROCEEDINGS BOOKLET

2012 DAILY AGENDA

 

TUESDAY, MAY 8
Technology Transfer

WEDNESDAY, MAY 9
Formal Synthesis

THURSDAY, MAY 10
Compositional Reasoning

FRIDAY, MAY 11
Design-In Security

0830-0900

Formal Methods & DO-178C
Darren Cofer, Rockwell Collins

Keynote Presentation: Program Synthesis for Performance
Markus Püschel, ETH Zurich

Keynote Presentation: A New Approach to Temporal Property Verification
Byron Cook, Microsoft Research

Designed-In Security in Context
Carl Landwehr, Cyber Security Policy and Research Institute

0900-0930

Keynote Presentation: Ensuring System Resilience at Design Time: A User and Attacker Oriented Approach
William Sanders, University of Illinois Urbana-Champaign

0930-1000
 
BREAK/ POSTER SESSION
 
 
BREAK
 
BREAK
1000-1030

Accessible Integrated Formal Reasoning Environments in Classroom Instruction of Mathematics
Andrei Lapets

Preventing Exploits Against Software of Uncertain Provenance
David Melski, GrammaTech

Keynote Presentation: The Ramify Rule of Separation Logic: Compositional Reasoning for Sharing
Jules Villard, University College London

 
BREAK/ POSTER SESSION
 
1030-1040 Lessons From Twenty Years of Industrial Formal Methods
Steve Miller, Rockwell Collins
1040-1115 Structured Orchestration of Data and Computation
Jayadev Misra, University of Texas at Austin

VIBRANCE: Automatic Removal of Security Vulnerabilities from Java Applications
Alessandro Coglio, Kestrel Institute

Verification of Elliptic Curve Cryptography
Joe Hendrix, Galois
1115-1120 Designing for the Human Element in Security
Angela Sasse, University College London
1120-1200

Developer-Friendly Contract-Based Notations and Machine-Checkable Evidence for Verification of Information Flow Properties for Embedded Systems
John Hatcliff

Compositional Verification of Architectural Models
Darren Cofer, Rockwell Collins

Axe: An Automated Formal Equivalence Checking Tool for Programs
Eric Smith, Kestrel Institute
1200-1330

LUNCH

LUNCH LUNCH LUNCH
1330-1410 Keynote Presentation: Technology Transfer Challenges Within the S&T Community
Dawn Meyerriecks, ODNI

Formal Synthesis of Efficient Verified Emulators
Magnus Myreen, University of Cambridge

Reasoning About Non-Determinism in Programs
Eric Koskinen, University of Cambridge and New York University

Keynote Presentation: A Look at Designed-In Security Needs and Preliminary Successes
Bill Scherlis, Carnegie Mellon University
1410-1430

Synthesizing Architectural Models of Cyber-Physical Systems
Pete Manolios, Northeatern University

FUSE: Inter-Application Security for Android
Joe Hurd, Galois

1430-1450 BREAK BREAK
1450-1500 Static Previrtualization
Natarajan Shankar and Ashish Gehani, SRI International

Framework for Evaluating Information Flows in Multicore Architectures for High Assurance Systems
Ryan Bradetich, University of Idaho

1500-1530 Tech Transfer of Software Tools
Jim Larus, Microsoft Research

Role of Domain-Specific Techniques in Designed-In Security
John Launchbury, Galois

1530-1545 BREAK/ POSTER SESSION BREAK
1545-1600

VehicleForge.mil: A Distributed Semantically-Aware Framework to Support the Needs of the Open Hardware Community
Jack Zentner, Georgia Tech

Designed-In Security for Mobile Applications
Jonathan Aldrich, Carnegie Mellon University
1600-1630

Synthesis of Concurrent Garbage Collectors
Douglas Smith, Kestrel Institute

Software Model Checking Secure Systems
Limin Jia, Carnegie Mellon University
1630-1640 Open Discussion on Technology Transfer High Assurance Cyber Military Systems: A New DARPA Program
Kathleen Fisher, DARPA

Margrave: Query-Based Policy Analysis
Dan Dougherty, Worcester Polytechnic Institute

1640-1700 3 Years After L.4 Verified
Gerwin Klein, NICTA and UNSW
1700

Adjourn for the day

1715

Conference Adjourned

1730

Adjourn for the day

 

Adjourn for the day

1830

Conference Dinner

The Chart House

300 2nd Street
Annapolis, MD 21403