HCSS Conference 2026 – Poster/Demo Sessions

Monday

Comparing the Cognitive Vulnerabilities of Human and AI-based Penetration Testers
Hajime Inoue and Zak Fry (GrammaTech)
From Firmware Analysis Outputs to Assurance Artifacts: Evidence-Driven Workflows in REAFFIRM
Christopher Wright (GrammaTech)
From Language to Logic: VLM-Grounded Safe Navigation in Novel Environments
Kristy Sakano and Kalonji Harrington (University of Maryland College Park)
STORM–Mission Assurance and System Security Engineering Methodology for Trustworthy Systems with AI
Shiu-Kai Chin and Jae Oh (Syracuse University)
Lessons Learned from Formal Verification of Lattice-Based Post-Quantum Cryptography in Software: From C to Rust
Reza Azarderakhsh (FAU and PQSecure)
Towards Autoformalization of LLM-Generated Outputs for Requirement Verification
Mihir Gupte and Ramesh S. (General Motors)
Trustworthy Autonomy: Logic Meets Learning for Safety-Critical Systems
Aniruddh Puranic (University of Maryland College Park)
Vibes to Verification
Balaji Rao (Stevens Institute of Technology)

Tuesday

The ARCOS Tool Portal: An Enabling Infrastructure for Hands-On Software Assurance Tools Exploration
Yogesh Barve and Katie Dey (Vanderbilt University)
Formal Methods Approaches at Kestrel
Grant Jurgensen and Eric Smith (Kestrel Institute)
Establishing Trust in Hidden Communication Systems
Olivier Savary Bélanger (Galois), John Cyphert (STR), and Kevin Batz (Cornell University)
High-assurance Agentic AI Frameworks
Tyler Smith and Benoit Razet (Galois)
Research @ Galois: Driven by Curiosity / Ground in Proof
Brad Martin (Galois)

Wednesday

Automated Porting of C/C++ to CHERI Memory-Safe Hardware
David Musliner (SIFT)
Combinatorial Methods for Functional Verification and Hardware Vulnerability Detection
M S Raunak and Rick Kuhn (National Institute of Standards and Technology (NIST))
Cyber knowledge representation for collaborative tiered cyber-reasoning
Gregory Briskin (Trusted Science and Technology)
Modeling and Analysis of Weird Networks using Probabilistic Timed Automata
Ian Blumenfeld, Andrew Chen, Andrew Choe, Yakir Forman, Manasvi Parikh, Lucas Peña, Kyle Treubig, Paul Vines, Jared Ziegler (Two Six Technologies)
Adam Mendenhall, Thomas Wahl (Trusted Science and Technology)
Quantifying Side Channel Leakage with Probabilistic Abstract Interpretation
Keara Hill (Binghamton University)
Software Understanding for National Security (SUNS): Closing the Software Understanding Gap
Douglas Ghormley and Christopher Harrison (Sandia National Labs)
Safe Integration of AI for Cryptographic Protocol Analysis
Paul Rowe and Andres Molina-Markham (MITRE)