Visible to the public 2011 HCSS Conference Program Agenda

2011 HCSS Conference Program Agenda

Conference Archives: 200120022003200420052006200720082009201020112012, 2013, 2014http://cps-vo.org/node/1354

 

Monday, May 2

Noon Registration
1:00 pm Cryptol Tutorial - Galois, Inc.
Venue: The Maryland Inn
3:00 pm Refreshments
3:30 pm Cryptol Tutorial - Galois, Inc.
Venue: The Maryland Inn
5:00 pm Adjourn for the day


Tuesday, May 3

Theme: Evidence
7:30 am Continental Breakfast | Registration (all day)
8:30 am Keynote Presentation: Compiler Verification and Beyond: Verified Tools For High-Assurance Software
Xavier Leroy, INRIA
9:30 am Refreshments
10:00 am Verified Compiler Technology and Separation Logic for Reasoning about Concurrent C Programs
Andrew Appel, Princeton University
10:40 am Towards High-Assurance Run-Time Systems
Andrew Tolmach, Portland State University
11:20 am Using the Cambridge ARM Model to Verify the Concrete Machine Code of seL4
Magnus Myreen, University of Cambridge
Noon Lunch (on your own)
1:30 pm Let's Build Secure Systems on a Correct Kernel
June Andronick, NICTA
2:15 pm Developing Secure Mobile Architectures: The COTS Challenge
Adam Wick, Galois
3:00 pm Refreshments
3:30 pm Proposed Formal Methods Supplement for RTCA DO 178C
Jeff Joyce, Critical Systems Labs
4:15 pm Parametric Verification of Address Space Separation
Jason Franklin, Carnegie Mellon University
5:00 pm The CPS Virtual Organization
Chris vanBuskirk, ISIS - Vanderbilt University
5:30 pm Adjourn for the day
6:30 pm Conference Dinner at The Treaty of Paris Restaurant

Wednesday, May 4

Theme: Cyber-Physical Systems
7:30 am Continental Breakfast | Registration (all day)
8:30 am Keynote Presentation: Time for High-Confidence Software Systems
Edward A. Lee, UC Berkeley
9:30 am Refreshments
10:00 am Keynote Presentation: Wireless Control Networks: Modeling, Synthesis, Robustness, Security
George Pappas, University of Pennsylvania
10:50 am Applying Formal Methods to Prove Correctness of Surgical Robot Software
Peter Kazanzides and Yanni Kouskoulas, Johns Hopkins University Applied Physics Lab
11:25 pm Verifying Timing-Centric Software Systems
Sanjit Seshia, UC Berkeley
Noon Lunch (on your own)
1:30 pm Keynote Presentation: Making Sound Cyber Security Decisions Through a Quantitative Metrics Approach
Bill Sanders, UIUC
2:30 pm Refreshments
3:00 pm Using Symbolic Execution to Obtain Greater Automation & Flexibility for Checking Spark Software Contracts in Critical ES
John Hatcliff, Kansas State University
3:40 pm Real-Time Runtime Monitoring
Lee Pike, Galois
4:20 pm Making High-Confidence Systems Low-Cost
Alex Dean, NC State
5:00 pm Adjourn for the day

Thursday, May 5

Theme: Science of Security
7:30 am Contintental Breakfast | Registration
8:30 am Keynote Presentation: More WINE, Less Dahusian Research
Marc Dacier, Symantec Research Labs - Europe
9:30 am Refreshments
10:00 am Dynamic Enforcement of Knowledge-Based Security Policies
Stephen Magill, University of Maryland
10:40 am Enforcing Information Flow Policies Via Generation of Monitors in Java Card Runtime Environment
Alessandro Coglio, Kestrel Institute
11:20 am Moving-Target Defense With Configuration-Space Randomization
Sanjai Narain, Telcordia
Noon Lunch (on your own)
1:30 pm Guardol: A Domain-Specific Language for Guards Supporting Strong Automated Formal Analysis
Konrad Slind, Rockwell Collins
2:15 pm Information Security: The Legacy of a Maginot Line Cyberspace
Doug DePeppe, i2IS Cyberspace Solutions
3:00 pm Refreshments
3:30 pm The Open World Framework
Sujata Millick, HP Labs
4:15 pm From Designed (Insecurity) to (Designed-In) Security
Carl Landwehr, NSF
5:00 pm Adjourn for the day

Friday, May 6

Theme: HCSS/CAS Tools and Technologies
7:30 am Contintental Breakfast | Registration
8:30 am Keynote Presentation: Security Inception
Jeff Williams, Aspect Security
9:30 am Refreshments
10:00 am Matching Logic
Grigore Rosu, Universityof Illinois at Urbana-Champaign
10:40 am Analysis-Based Verification: A Programmer-Oriented Approach to the Assurance of Mechanical Program Properties
Tim Halloran, Sure Logic
11:20 am Automatically Identifying Exploitable Bugs
David Brumley, Carnegie Mellon University
Noon Lunch (on your own)
1:30 pm Software Vulnerabilities Precluded by SPARK
Paul E. Black, NIST
2:00 pm CAS Static Analysis Tool Study Overview
Chuck Willis, Mandiant
2:30 pm Panel: State of the Art om Software Assurance Static Analysis Technology
Moderator: Kris Britton, NSA
Panelists: Peter Henriksen (Coverity), Christien Rioux (Veracode), Tim Teitelbaum (GrammaTech), Jacob West (Fortify)
3:30 pm Conference Adjourned