HCSS Conference 2026 – Poster/Demo Sessions
Monday – Poster/Demo Session
Theme: AI as an Enabler
| Comparing the Cognitive Vulnerabilities of Human and AI-based Penetration Testers Hajime Inoue and Zak Fry (GrammaTech) |
| From Firmware Analysis Outputs to Assurance Artifacts: Evidence-Driven Workflows in REAFFIRM Christopher Wright (GrammaTech) |
| From Language to Logic: VLM-Grounded Safe Navigation in Novel Environments Kristy Sakano and Kalonji Harrington (University of Maryland College Park) |
| Lessons Learned from Formal Verification of Lattice-Based Post-Quantum Cryptography in Software: From C to Rust Reza Azarderakhsh (FAU and PQSecure) |
| Safe Integration of AI for Cryptographic Protocol Analysis Lauren Brandt (MITRE) |
| Towards Autoformalization of LLM-Generated Outputs for Requirement Verification Mihir Gupte and Ramesh S. (General Motors) |
| Trustworthy Autonomy: Logic Meets Learning for Safety-Critical Systems Aniruddh Puranic (University of Maryland College Park) |
| Vibes to Verification Balaji Rao (Stevens Institute of Technology) |
Theme: Beyond AI
| STORM–Mission Assurance and System Security Engineering Methodology for Trustworthy Systems with AI Shiu-Kai Chin and Jae Oh (Syracuse University) |
Wednesday – Poster/Demo Session
Theme: Beyond AI
| The ARCOS Tool Portal: An Enabling Infrastructure for Hands-On Software Assurance Tools Exploration Yogesh Barve and Katie Dey (Vanderbilt University) |
| Cyber knowledge representation for collaborative tiered cyber-reasoning Gregory Briskin (Trusted Science and Technology) |
| Establishing Trust in Hidden Communication Systems Olivier Savary Bélanger (Galois), John Cyphert (STR), and Kevin Batz (Cornell University) |
| Modeling and Analysis of Weird Networks using Probabilistic Timed Automata Thomas Wahl and Adam Mendenhall (Trusted ST) Andrew Chen, Paul Vines, and Kyle Treubig (Two Six Technologies) |
| Quantifying Side Channel Leakage with Probabilistic Abstract Interpretation Keara Hill (Binghamton University) |
Theme: Hardware Security
| Combinatorial Methods for Functional Verification and Hardware Vulnerability Detection M S Raunak and Rick Kuhn (National Institute of Standards and Technology (NIST)) |
![]()