Visible to the public 2018 Program Agenda

 

  MONDAY, MAY 7
Trusting Autonomy
TUESDAY, MAY 8
Complex Heterogeneous Systems
WEDNESDAY, MAY 9
Blockchain
0900
-
1000
Keynote Presentation
Assured Autonomy
Sandeep Neema (DARPA)
Keynote Presentation
A Four Pillar Improvement Strategy to Qualification of Embedded Software Systems
Peter H. Feiler (SEI)
Keynote Presentation
Challenges Ahead for Blockchains
Emin Gün Sirer (Cornell)
1000
-
1030
Data-driven Safe Control of Nonlinear Systems
Susmit Jha
(SRI International)
Perspectives on Applying the Safety Case Approach for the Assurance of Complex Heterogeneous Systems
Ewen Denney
(SGT / NASA Ames)
On the Emerging Trend of Computer-Aided Cryptology and the Technology Transition Gap it Presents 
Evan Austin 
(SPAWAR Systems Center Atlantic)
1030
-
1100

BREAK
 
BREAK BREAK
1100
-
1130
Using Formal Methods to Reason About Neural Network Based Autonomous Systems
Stephen Magill
(Galois, Inc.)

Principles of Layered Attestation
Paul Rowe
(The MITRE Corporation)

Applying Symbolic Execution to Blockchain Applications
Mark Mossberg
(Trail of Bits)
1130
-
1145
Towards Formally Verified Deep Neural Networks
Clark Barrett
(Stanford University)
Architecture-Driven Assurance for Model-Based Systems Engineering
Darren Cofer
(Rockwell Collins)
1145
-
1200
Resilient and Trustworthy Transactive Platform for Smart and Connected Communities 
Aron Laszka 
(University of Houston)
1200
-
1215
LUNCH
(on your own)
LUNCH
(on your own)
1215
-
1245
Case Study: Verifying Safety of a UUV Heading PID Controller
Daniel Genin
(JHU APL)
1245
-
1330
Conference Adjourned
1330
-
1415
Invited Presenter
Growing Risk of Cyber Attacks
Vinh Nguyen (ODNI)
Invited Presenter
The Future of Cyber-autonomy

David Brumley (ForAllSecure / CMU)

 

1415
-
1500

POSTER SESSION / BREAK
 
POSTER SESSION / BREAK
1500
-
1530
Intrusion and Anomaly Detection in Autonomous Vehicle Systems
Sam Lauzon (University of Michigan - Transportation Research Institute)
Model-based System Certification –
A Vision

Jérôme Hugues (ISAE Supaero)
1530
-
1600
The KeYmaera X Theorem Prover: Hybrid Systems Verification and Verified Runtime Validation
Stefan Mitsch
(CMU)
VeriCores: Cyber-Instrumenting Devices Built from Verified Components 
David Hardin 
(Rockwell Collins)
1600
-
1630
Safe Pointers and Verifiable Automatic Heap Management without Garbage Collection
S. Tucker Taft
(AdaCore)
High-Assurance Blockchains: Applications and Verification
Joe Hendrix
(Galois, Inc)
1630 Adjourn for the day Adjourn for the day
1830
Conference Dinner

The Chart House

300 2nd Street
Annapolis, MD 21403
 

Conference Archives: 2001200220032004200520062007200820092010201120122013, 2014, 2015, 2016, 2017