Visible to the public HCSS 2017 Program Agenda

DOWNLOAD PRINTER-FRIENDLY VERSION | DOWNLOAD PROCEEDINGS BOOKLET

2017 DAILY AGENDA

 

MONDAY, MAY 8
Industrialization of Formal Methods

TUESDAY, MAY 9
Privacy

WEDNESDAY, MAY 10
Assurance for AI and
Technology and Model Cross-over

0900 - 1000

Keynote Presentation:
Formal Methods and the Defense Industrial Base

Ray Richards
(DARPA)

Keynote Presentation:
Privacy Engineering: Just Another Unicorn?

Naomi Lefkovitz
(NIST)

Keynote Presentation:
Challenges in Assuring AI
John Launchbury
(DARPA)

1000 - 1030

Proving Amazon's s2n Correct
Joey Dodds
(Galois, Inc.)

Jana - Private Data as a Service
David Archer
(Galois, Inc.)

Certified Multiplicative Weights Update, or Verified Learning Without Regret
Gordon Stewart
(Ohio University)

1030 - 1100

BREAK

BREAK BREAK
1100 - 1130 Cross-Tool Semantics for Protocol Security Goals
Joshua Guttman
(MITRE)

The Semantics of Privacy: From Privacy Policy Analysis to Code-Level Enforcement
Travis Breaux
(CMU)

A Commitment Logic for Reasoning about Trust in Complex Systems
David Burke
(Galois, Inc.)
1130 - 1200

Levels of Software Assurance in SPARK
Yannick Moy
(AdaCore)

Applying NIST's new Privacy Risk Management Framework
Isaac Potoczny-Jones
(Tozny, LLC.)

Verified Data Structures for Trusted Autonomy: A Compilation Approach
David Hardin and Konrad Slind
(Rockwell Collins)

1200 - 1330

LUNCH 
(on your own)

LUNCH
(on your own)
LUNCH
(on your own)
1330 - 1400

Certifying SAT Proofs
Warren Hunt
(UT Austin)

Keynote Presentation:
Differential Privacy and Data Analysis
Aaron Roth
(UPenn)
Keynote Presentation:
Symmetries in Software 
Evan Fortunato
(Apogee Research)
1400 - 1430

SunDew: Systematic Automated Security Testing
Franjo Ivancic
(Google)

1430 - 1500

 

POSTER SESSION

 

POSTER SESSION POSTER SESSION
1500 - 1515

Development of Verified Message Encoder/Decoder for Automotive V2V Communications
Mark Tullsen (Galois, Inc.)

1515 - 1530 Allowing Bounded Leakage in Secure Computation:
A New Application of Differential Privacy

Dov Gordon
(George Mason University)
A Translationally Inspired Model for Autonomous Device Self-Regulation
Greg Wettstein
(IDfusion, LLC.)
1530 - 1600

Z3str3: A DPLL(T) Solver for a Theory of Strings and Integers
Murphy Berzish 
(University of Waterloo)

1600 - 1630

Identifying Security Critical Properties for the Dynamic Verification of a Processor
Rui Zhang
(UNC Chapel Hill)

Design Studio for Rigorous System Design using Architecture Styles and BIP
Anastasia Mavridou
(Vanderbilt University)

Invited Talk
Matt Fredrikson
(CMU)

1630

Adjourn for the day

Adjourn for the day

 

Conference Adjourned

1830
Conference Dinner

Blackwall Hitch Annapolis

400 Sixth Street
Annapolis, MD 21403