Visible to the public HCSS 2016 - Program Agenda

DOWNLOAD PRINTER-FRIENDLY VERSION | DOWNLOAD PROCEEDINGS BOOKLET

2016 DAILY AGENDA

 

TUESDAY, MAY 10
Reasoning / IP

WEDNESDAY, MAY 11
Measuring Security

THURSDAY, MAY 12
Uncertainty and Adaptive Systems
0900 - 1000 Keynote Presentation:
Verification Across Intellectual Property Boundaries

Sagar Chaki (CMU-SEI)

Keynote Presentation
Metric or English: Characterizing and Conveying Trustworthiness
Fred B. Schneider (Cornell)

Keynote Presentation:
Programming Uncertain <T>hings

Kathryn McKinley (Microsoft Research)

1000 - 1030 The Science of Deep Specification
Benjamin Pierce (Penn)
Build It Break It Fix It:
Measuring Secure Development

Andrew Ruef (University of Maryland)

Formal Verification of C Programs with Floating-Point Computations: Certified Error Bounds
for Signal Processing

Tahina Ramananandro
(Reservoir Labs Inc)

1030 - 1100

BREAK

BREAK BREAK
1100 -  1130

Interrupts in OS code:
let's reason about them.
Yes, this means concurrency.

June Andronick (Data61 and UNSW)

Measuring Protocol Strength
with Security Goals

Paul Rowe (The MITRE Corporation)

Wigmore: A Constraint-Based Language for Reasoning About Evidence and Uncertainty
David Burke (Galois, Inc.)
1130 - 1200

Android Platform Modeling and Android App Verification
in the ACL2 Theorem Prover

Eric W. Smith (Kestrel Institute)

Combinatorial Coverage Analysis
of Subsets of the TLS Cipher Suite Registry

Dimitris Simos (SBA Research)
Formal Modeling and Analysis of Hierarchical Path Planning
Cesare Tinelli (The University of Iowa)
1200 - 1330

LUNCH
(on your own)

LUNCH
(on your own)
LUNCH
(on your own)
1330 - 1400 "It's QEDs All the Way Down"
David Hardin (Rockwell Collins)

New Perspectives on Automated Vulnerability Discovery
Artem Dinaburg (Trail of Bits)

Keynote Presentation:
Data and Decision Analytics

Robert Bonneau (OSD)
1400 - 1430

Moving Hardware from
“Security through Obscurity”
to “Secure by Design”

Ryan Kastner (UCSD)

Gradual Information Flow Control
Peter Thiemann (Universität Freiburg)
1430 - 1500 POSTER SESSION POSTER SESSION

BREAK

1500 - 1530

Automatic Software Verification
for High-Confidence
Cyber-Physical Systems

Miroslav Pajic (Duke University)

1530 - 1600

Learning State-Rich
Specifications from "Big Code"

Swarat Chaudhuri (Rice University)

TQL-1 Qualification of a Model-Based Code Generator
S. Tucker Taft (AdaCore)
Safety-Constrained
Reinforcement Learning for MDPs

Nils Jansen (UT Austin)
1600 - 1630

A String, Regular Expression,
and Integer Solver for Bug-finding and Security

Yunhui Zheng (IBM)

Collaboration and Automation for
Threat Assessment and Mitigation

Dave Archer (Galois, Inc.)

Confernence Adjourned
1630

Adjourn for the day

Adjourn for the day

 

1830
Conference Dinner

The Chart House
300 2nd Street
Annapolis, MD 21403