Visible to the public 2013 HCSS Conference Program Agenda

2013 HCSS Conference Program Agenda

Conference Archives: 20012002200320042005200620072008200920102011201220132014http://cps-vo.org/group/hcss_conference/program

Tuesday, May 7

Theme: JavaScript
8:00 am Continental Breakfast | Registration (all day)
9:00 am Keynote Presentation: Taming JavaScript with F*
Nikhil Swamy, Microsoft Research
10:00 am Planet Dynamic or: How I Learned to Stop Worrying and Love Reflection
Jan Vitek, Purdue
10:30 am Refreshments
11:00 am Protecting Sensitive Data in Web Browsers with ScriptPolice
Brad Karp, University College London
11:30 am Dependent Types for JavaScript
Ravi Chugh, UC San Diego
Noon JSCert: Certifying JavaScript
Philippa Gardner, Imperial College London
12:30 pm Lunch (on your own)
2:00 pm Keynote Presentation: What We're Not Working On Susan Alexander, IARPA
2:30 pm Keynote Presentation: A Family of Certification Methods for JavaScript and Its Environments
Shriram Krishnamurthi, Brown University
3:30 pm Refreshments
4:00 pm You Can't Touch This: Dynamic Access Control for JavaScript
Peter Thiemann, University of Freiburg - Germany
4:30 pm Security Analysis of LLVM Bitcode Files for Mobile Platforms
Vivek Sarkar, Rice University
5:00 pm Adjourn for the day

Wednesday, May 8

Theme: SMT
8:00 am Continental Breakfast | Registration (all day)
9:00 am Keynote Presentation: Automatic Theorem Proving and SMT
Nikolaj Bjørner, Microsoft Research
10:00 am From SMT Solvers to Verifiers
Aws Albarghouthi, University of Toronto
10:30 am Refreshments and Poster Session
11:00 am Automated Deductive Translation of Guardol Programs and Specifications into SMT-Provable Properties
Konrad Slind, Rockwell Collins
11:30 am Techniques for Scalable Symbolic Simulation
Aaron Tomb, Galois
Noon A Lazy SMT Bit-vector Solver for Binary Symbolic Execution
Clark Barrett, New York University
12:30 pm Lunch (on your own)
2:00 pm Keynote Presentation: Cyber Defense Strategy
Dan Kaufman, DARPA
3:00 pm String Solvers for Web Security
Vijay Ganesh, University of Waterloo
3:30 pm Refreshments
4:00 pm Thwarting Themida: Unpacking Malware with SMT Solvers
Ian Blumenfeld, CyberPoint
4:30 pm Separation Logic Modulo Theories
Juan Antonio Navarro Perez, University College London
5:00 pm Adjourn for the day
6:30 pm Conference Dinner at The Chart House

Thursday, May 9

Theme: The Boundary Between Hardware and Software
8:00 am Continental Breakfast | Registration (all day)
9:00 an Keynote Presentation: Verified Software Fault Isolation
Greg Morrisett, Harvard University
10:00 am Efficient and Verified Checking of Unsatisfiability Proofs
Marijn Heule, The University of Texas at Austin
10:30 am Refreshments
11:00 am TrackOS: A Security-Aware RTOS
Lee Pike, Galois
11:30 am Above and Beyond: SeL4 Noninterference and Binary Verification (PT. 1, PT.2)
Toby Murray and Thomas Sewell, UNSW and NICTA
Noon Applying Language-Based Static Verification in an ARM Operating Systems
Matthew Danish
12:30 pm Lunch (on your own)
2:00 pm Keynote Presentation: Enterprise Level Malware Analysis Initiatives
Joseph C. Opacki, FBI
2:30 pm Cache and IO-Efficient Functional Algorithms
Robert Harper, Carnegie Mellon University
3:00 pm Refreshments
3:30 pm Verification of Concurrent Software in the Context of Weak Memory
Jade Alglave, University College London
4:00 pm Weak Memory and the Perils of ARM: Using Dynamic Analysis to Probe Concurrency Issues for Safe/Secure Mobiles Applications
Timothy Halloran, SureLogic
4:30 pm Formal Specification of the X86 ISA
Warren Hunt, The University of Texas at Austin
5:00 pm Adjourn for the day

Friday, May 11

Theme: Designed-In Security
8:00 am Contintental Breakfast | Registration
9:00 am Access Control Policy Tool (ACPT), An Assurance Tool That Combines Symbolic Model Checking with Combinatorial Coverage
Vincent Hu, National Institute of Standards and Technology
9:30 am Verifying the Trusted Processor Module
Perry Alexander, The University of Kansas
10:00 am Secure Virtualization With Formal Methods
Cynthia Sturton, UC Berkeley
10:30 am Refreshments
11:00 am Tutorial: Nikolaj Bjørner, Microsoft Research
12:30 pm Conference Adjourned