HCSS 2020 Program Agenda
Monday | Tuesday | Wednesday | Thursday |
Conference Timezone: Eastern Daylight Time (EDT) PRINT-FRIENDLY VERSION |
||
MONDAY, SEPTEMBER 14 Theme: Architecture-level Formal Methods for New and Existing Systems |
|||
1100 - 1145 |
PANEL: HCSS 20th Anniversary Reflections Mark Jones (Portland State University) John Launchbury (Galois) Brad Martin (NSA) Matt Wilding (Collins Aerospace) |
||
1145 - 1215 | Run-Time Assurance Architecture for Learning-Enabled Systems Darren Cofer (Collins Aerospace) |
||
1215 - 1300 | BREAK |
||
1300 - 1330 | KEYNOTE: IDAS: Intent-Defined Adaptive Software ARCOS: Automated Rapid Certification of Software Ray Richards (DARPA) |
||
1330 - 1400 | Actionable definition of Safety Design Patterns using AADLv2, ALISA and the Error Modeling Annex Jérôme Hugues (CMU/SEI) |
||
1400 - 1430 | BREAK |
||
1430 - 1530 | KEYNOTE: Take a SEAT: Security-Enhancing Architectural Transformations Konrad Slind (Collins Aerospace) |
||
1530 - 1600 | A Verified Optimizer for Quantum Circuits Robert Rand (University of Chicago) |
||
1600 - 1630 | Cryptographic Protocol Verification in AWS Adam Petcher (Amazon Web Services) |
||
1630 - 1700 | NETWORKING |
||
TUESDAY, SEPTEMBER 15 Theme: Cognitive Security |
|||
1100 - 1200 |
KEYNOTE: Trustworthy AI Jeannette Wing (Columbia) |
||
1200 - 1230 | Improving Computer Security by Understanding Cognitive Security Kimberly Ferguson-Walter (National Security Agency’s Laboratory for Advanced Cybersecurity Research) |
||
1230 - 1315 | BREAK |
||
1315 - 1400 | The Changing Face of Computational Propaganda: AI, Encryption, Geofencing and the Manipulation of Public Opinion Samuel Woolley (University of Texas, Austin) |
||
1400 - 1530 | POSTER & NETWORKING SESSION |
||
WEDNESDAY, SEPTEMBER 16 Theme: Formal Methods at Scale |
|||
1100 - 1200 |
PANEL: FM@Scale Workshop Summary Patrick Lincoln (SRI) Brad Martin (NSA) William Scherlis (DARPA) |
||
1200 - 1230 | Integration Challenges in Static Analysis and Verification Stephen Magill (MuseDev) |
||
1230 - 1315 | BREAK |
||
1315 - 1345 | Formal Verification of Production Distributed Protocols Mike Dodds (Galois) |
||
1345 - 1415 | Verifying C++ at Scale Gregory Malecha (BedRock Systems) |
||
1415 - 1445 | Analysis of the Secure Remote Password Protocol Using CPSA Erin Lanus (Virginia Tech) |
||
1445 - 1530 | BREAK |
||
1530 - 1600 | 3C: Interactive Conversion of C to Checked C Michael Hicks (Correct Computation Inc. / University of Maryland) |
||
1600 - 1630 | Adapting to demand: seL4 proofs and proof engineering practice Matthew Brecknell (Data61, CSIRO, Australia) |
||
1630 - 1700 | NETWORKING |
||
THURSDAY, SEPTEMBER 17 Theme: Formal Methods at Scale |
|||
1100 - 1200 |
KEYNOTE: Distributed and Trustworthy Automated Reasoning Marijn Heule (Carnegie Mellon University) |
||
1200 - 1230 | Geometric Path Enumeration Methods for Verifying ReLU Neural Networks Stanley Bak (Stony Brook University / Safe Sky Analytics) |
||
1230 - 1315 | BREAK |
||
1315 - 1345 | Verification is Engineering Joey Dodds (Galois) |
||
1345 - 1415 | End-to-End Verification of Initial and Transition Properties of GR(1) Designs Generated by Salty in SPARK Laura Humphrey (Air Force Research Laboratory) |
||
1415 - 1445 | Scalable Sound Static Analysis of Real-world C Applications using Abstract Interpretation Henny Sipma (Kestrel Technology) Paul E. Black (NIST) |
||
1445 - 1530 | BREAK |
||
1530 - 1600 | Automated Analysis of AWS Access Control Andrew Gacek (Amazon Web Services) |
||
1600 - 1630 | Code-Level Model Checking in the Software Development Workflow Daniel Schwartz-Narbonne (Amazon Web Services) |
||
1630 - 1700 | NETWORKING |
||
CONFERENCE ADJOURNED |