Visible to the public HCSS 2020 Program CommitteeConflict Detection Enabled

  P R O G R A M   C O - C H A I R S  

JUNE ANDRONICK leads the Trustworthy Systems group, world-leading in the area of verified operating systems software, known worldwide for the formal verification of the seL4 microkernel.  She is a Principal Research Scientist at CSIRO's Data61, and conjoint Associate Professor at UNSW Sydney, Australia. Her main research interest is in formal verification and certification of software systems, more precisely in formal proofs of correctness and security properties of programs using interactive theorem proving, as well as concurrency reasoning, targeting interruptible and multicore systems. She was recognised in 2011 by MIT's Technology Review as one of the world's top young innovators (TR35). She previously worked in industry for the smart-card manufacturer Gemalto in Formal Methods research, where she did my PhD in collaboration with University of Paris Sud. DR. ERIC W. SMITH is a Senior Computer Scientist at Kestrel Institute with over 18 years of experience in formal methods. He co-leads Kestrel's APT (Automated Program Transformations) project, which is developing proof-emitting program transformations in the ACL2 theorem prover and has been used in several Kestrel research projects. Dr. Smith is also continuing to develop the Axe tool originally written for his Ph.D. thesis at Stanford University. Axe can verify Java bytecode and x86 binary programs by lifting them into a logical representation which is then proved equivalent to a formal specification using Axe's high-performance rewriter and equivalence checker.  Dr. Smith currently leads Kestrel's AAHAA project to synthesize high-assurance monitors for machine learning algorithms.  He led Kestrel's DerivationMiner effort, which used program synthesis techniques (derivations, specifications, and refinements) to construct correctness proofs of code found in large online repositories, and he led Kestrel's DARPA APAC effort to find malware in Android apps and formally prove the correctness of apps without malware.

  C O M M I T T E E  

PERRY ALEXANDER, University of Kansas
KATHLEEN FISHER, Tufts University
JOHN HATCLIFF, Kansas State University
STEPHEN MAGILL, Muse Dev and Galois, Inc.

BRAD MARTIN, National Security Agency
SEAN WEAVER, National Security Agency
MATT WILDING, Collins Aerospace

  O R G A N I Z E R S   

Publicity and Communications: KATIE DEY (Vanderbilt University)
Local Arrangements: ANNE DYSON (Cyber Pack Ventures) and REGAN WILLIAMS (Vanderbilt University)
Graphic Design: AMY KARNS (Vanderbilt University)