Visible to the public HCSS 2017 Program Agenda

DOWNLOAD PRINTER-FRIENDLY VERSION | DOWNLOAD PROCEEDINGS BOOKLET

  MONDAY, MAY 8
Industrialization of Formal Methods
TUESDAY, MAY 9
Privacy
WEDNESDAY, MAY 10
Assurance for AI and
Technology and Model Cross-over
0900 - 0915 Keynote Presentation:
Formal Methods and the Defense Industrial Base

Ray Richards
(DARPA)
Keynote Presentation:
Privacy Engineering: Just Another Unicorn?

Naomi Lefkovitz
(NIST)
Keynote Presentation:
Challenges in Assuring AI
John Launchbury
(DARPA)
0915 - 0930
0930 - 0945
0945 - 1000
1000 - 1015 Proving Amazon's s2n Correct
Joey Dodds
(Galois, Inc.)
Jana - Private Data as a Service
David Archer
(Galois, Inc.)
Certified Multiplicative Weights Update, or Verified Learning Without Regret
Gordon Stewart
(Ohio University)
1015 - 1030
1030 - 1045 Break Break Break
1045 - 1100
1100 - 1115 Cross-Tool Semantics for Protocol Security Goals
Joshua Guttman
(MITRE)

The Semantics of Privacy: From Privacy Policy Analysis to Code-Level Enforcement
Travis Breaux
(CMU)

A Commitment Logic for Reasoning about Trust in Complex Systems
David Burke
(Galois, Inc.)
1115 - 1130
1130 - 1145 Levels of Software Assurance in SPARK
Yannick Moy
(AdaCore)
Applying NIST's new Privacy Risk Management Framework
Isaac Potoczny-Jones
(Tozny, LLC.)
Verified Data Structures for Trusted Autonomy: A Compilation Approach
David Hardin and Konrad Slind
(Rockwell Collins)
1145 - 1200
1200 - 1330 Lunch
(on your own)
Lunch
(on your own)
Lunch
(on your own)
1330 - 1345 Certifying SAT Proofs
Warren Hunt
(UT Austin)
Keynote Presentation:
Differential Privacy and Data Analysis
Aaron Roth
(UPenn)
Keynote Presentation:
Symmetries in Software 
Evan Fortunato
(Apogee Research)
1345 - 1400
1400 - 1415 SunDew: Systematic Automated Security Testing
Franjo Ivancic
(Google)
1415 - 1430
1430 - 1445 POSTER SESSION POSTER SESSION

POSTER SESSION

1445 - 1500
1500 - 1515 Development of Verified Message Encoder/Decoder for Automotive V2V Communications
Mark Tullsen (Galois, Inc.)
1515 - 1530 Allowing Bounded Leakage in Secure Computation:
A New Application of Differential Privacy

Dov Gordon
(George Mason University)
A Translationally Inspired Model for Autonomous Device Self-Regulation
Greg Wettstein
(IDfusion, LLC.)
1530 - 1545 Z3str3: A DPLL(T) Solver for a Theory of Strings and Integers
Murphy Berzish 
(University of Waterloo)
1545 - 1600
1600 - 1615 Identifying Security Critical Properties for the Dynamic Verification of a Processor
Rui Zhang
(UNC Chapel Hill)
Design Studio for Rigorous System Design using Architecture Styles and BIP
Anastasia Mavridou
(Vanderbilt University)
Invited Talk
Matt Fredrikson
(CMU)
1615 - 1630
1630 Adjourn for the day Adjourn for the day Conference Adjourned
1830
Conference Dinner

Blackwall Hitch Annapolis

400 Sixth Street
Annapolis, MD 21403

 

Conference Archives: 2001200220032004200520062007200820092010201120122013, 2014, 2015, 2016