Visible to the public 2012 HCSS Conference Program Agenda

2012 HCSS Conference Program Agenda

Conference Archives: 20012002200320042005200620072008200920102011201220132014
http://cps-vo.org/node/6777

 

Tuesday, May 8

Technology Transfer
7:30 am Continental Breakfast | Registration (all day)
8:30 am Formal Methods & DO-178C
Darren Cofer, Rockwell Collins
9:30 am Refreshments
10:00 am Accessible Integrated Formal Reasoning Environments in Classroom Instruction of Mathematics
Andrei Lapets
10:40 am Structured Orchestration of Data and Computation
Jayadev Misra, University of Texas at Austin
11:20 am Developer-Friendly Contract-Based Notations and Machine-Checkable Evidence for Verification of Information Flow Properties for Embedded Systems
John Hatcliff
Noon Lunch
1:30 pm Keynote Presentation: Technology Transfer Challenges Within the S&T Community
Dawn Meyerriecks, ODNI
2:30 pm Refreshments
3:00 pm Tech Transfer of Software Tools
Jim Larus, Microsoft Research
3:45 pm VehicleForge.mil: A Distributed Semantically-Aware Framework to Support the Needs of the Open Hardware Community
Jack Zentner, Georgia Tech
4:30 pm Open Discussion on Technology Transfer
5:00 pm Adjourn for the day


Wednesday, May 9

Theme: Formal Synthesis
7:30 am Continental Breakfast | Registration (all day)
8:30 am Keynote Presentation: Program Synthesis for Performance
Markus Püschel, ETH Zurich
9:30 am Refreshments and Poster Session
10:00 am Preventing Exploits Against Software of Uncertain Provenance
David Melski, GrammaTech
10:40 am VIBRANCE: Automatic Removal of Security Vulnerabilities from Java Applications
Alessandro Coglio, Kestrel Institute
11:20 am Compositional Verification of Architectural Models
Darren Cofer, Rockwell Collins
Noon Lunch (on your own)
1:30 pm Formal Synthesis of Efficient Verified Emulators
Magnus Myreen, University of Cambridge
2:10 pm Synthesizing Architectural Models of Cyber-Physical Systems
Pete Manolios, Northeatern University
2:50 pm Static Previrtualization
Natarajan Shankar and Ashish Gehani, SRI International
3:30 pm Refreshments and Poster Session
4:00 pm Synthesis of Concurrent Garbage Collectors
Douglas Smith, Kestrel Institute
4:30 High Assurance Cyber Military Systems: A New DARPA Program
Kathleen Fisher, DARPA
5:30 pm Adjourn for the day
6:30 pm Conference Dinner at The Chart House

Thursday, May 10

Theme: Compositional Reasoning
7:30 am Continental Breakfast | Registration (all day)
8:30 am Keynote Presentation: A New Approach to Temporal Property Verification
Byron Cook, Microsoft Research
9:30 am Refreshments
10:00 am Keynote Presentation: The Ramify Rule of Separation Logic: Compositional Reasoning for Sharing
Jules Villard, University College London
10:40 am Verification of Elliptic Curve Cryptography
Joe Hendrix, Galois
11:20 am Axe: An Automated Formal Equivalence Checking Tool for Programs
Eric Smith, Kestrel Institute
Noon Lunch (on your own)
1:30 pm Reasoning About Non-Determinism in Programs
Eric Koskinen, University of Cambridge and New York University
2:10 pm FUSE: Inter-Application Security for Android
Joe Hurd, Galois
2:50 pm Framework for Evaluating Information Flows in Multicore Architectures for High Assurance Systems
Ryan Bradetich, University of Idaho
3:30 pm Refreshments
4:00 pm Software Model Checking Secure Systems
Limin Jia, Carnegie Mellon University
4:40 pm 3 Years After L.4 Verified
Gerwin Klein, NICTA and UNSW
5:30 pm Adjourn for the day

Friday, May 11

Theme: Design-In Security
7:30 am Contintental Breakfast | Registration
8:30 am Designed-In Security in Context
Carl Landwehr, Cyber Security Policy and Research Institute
9:00 am Keynote Presentation: Ensuring System Resilience at Design Time: A User and Attacker Oriented Approach
William Sanders, University of Illinois Urbana-Champaign
10:00 am Refreshments
10:30 am Lessons From Twenty Years of Industrial Formal Methods
Steve Miller, Rockwell Collins
11:15 am Designing for the Human Element in Security
Angela Sasse, University College London
Noon Lunch (on your own)
1:30 pm Keynote Presentation: A Look at Designed-In Security Needs and Preliminary Successes
Bill Scherlis, Carnegie Mellon University
2:30 pm Refreshments
3:00 pm Role of Domain-Specific Techniques in Designed-In Security
John Launchbury, Galois
3:45 pm Designed-In Security for Mobile Applications
Jonathan Aldrich, Carnegie Mellon University
4:30 pm Margrave: Query-Based Policy Analysis
Dan Dougherty, Worcester Polytechnic Institute
5:15 pm Conference End