Visible to the public HCSS 2016 - Program Agenda

  Tuesday, May 10
Reasoning / IP
Wednesday, May 11
Measuring Security
Thursday, May 12
Uncertainty and Adaptive Systems
0900 - 1000 Keynote Presentation:
Verification Across Intellectual Property Boundaries

Sagar Chaki (CMU-SEI)
Keynote Presentation
Metric or English: Characterizing and Conveying Trustworthiness
Fred B. Schneider (Cornell)
Keynote Presentation:
Programming Uncertain <T>hings

Kathryn McKinley (Microsoft Research)
1000 - 1030 The Science of Deep Specification
Benjamin Pierce (Penn)
Build It Break It Fix It:
Measuring Secure Development

Andrew Ruef (University of Maryland)
Formal Verification of C Programs with Floating-Point Computations: Certified Error Bounds
for Signal Processing

Tahina Ramananandro
(Reservoir Labs Inc)
1030 - 1100 Break Break Break
1100 - 1130 Interrupts in OS code:
let's reason about them.
Yes, this means concurrency.

June Andronick (Data61 and UNSW)
Measuring Protocol Strength
with Security Goals

Paul Rowe (The MITRE Corporation)
Wigmore: A Constraint-Based Language for Reasoning About Evidence and Uncertainty
David Burke (Galois, Inc.)
1130 - 1200 Android Platform Modeling and Android App Verification
in the ACL2 Theorem Prover

Eric W. Smith (Kestrel Institute)
Combinatorial Coverage Analysis
of Subsets of the TLS Cipher Suite Registry

Dimitris Simos (SBA Research)
Formal Modeling and Analysis of Hierarchical Path Planning
Cesare Tinelli (The University of Iowa)
1200 - 1330 Lunch
(on your own)
(on your own)
(on your own)
1330 - 1400 "It's QEDs All the Way Down"
David Hardin (Rockwell Collins)
New Perspectives on Automated Vulnerability Discovery
Artem Dinaburg (Trail of Bits)
Keynote Presentation:
Data and Decision Analytics

Robert Bonneau (OSD)
1400 - 1430 Moving Hardware from
“Security through Obscurity”
to “Secure by Design”

Ryan Kastner (UCSD)
Gradual Information Flow Control
Peter Thiemann (Universität Freiburg)


1500 - 1530 Automatic Software Verification
for High-Confidence
Cyber-Physical Systems

Miroslav Pajic (Duke University)
1530 - 1600 Learning State-Rich
Specifications from "Big Code"

Swarat Chaudhuri (Rice University)
TQL-1 Qualification of a Model-Based Code Generator
S. Tucker Taft (AdaCore)
Reinforcement Learning for MDPs

Nils Jansen (UT Austin)
1600 - 1630 A String, Regular Expression,
and Integer Solver for Bug-finding and Security

Yunhui Zheng (IBM)
Collaboration and Automation for
Threat Assessment and Mitigation

Dave Archer (Galois, Inc.)
Conference adjourned
1630 Adjourn for the day Adjourn for the day
1830 Conference Dinner
The Chart House

Conference Archives: 2001200220032004200520062007200820092010201120122013, 2014, 2015