HCSS Conference 2026 – Poster/Demo Sessions
Monday
| Comparing the Cognitive Vulnerabilities of Human and AI-based Penetration Testers Hajime Inoue and Zak Fry (GrammaTech) |
| From Firmware Analysis Outputs to Assurance Artifacts: Evidence-Driven Workflows in REAFFIRM Christopher Wright (GrammaTech) |
| From Language to Logic: VLM-Grounded Safe Navigation in Novel Environments Kristy Sakano and Kalonji Harrington (University of Maryland College Park) |
| STORM–Mission Assurance and System Security Engineering Methodology for Trustworthy Systems with AI Shiu-Kai Chin and Jae Oh (Syracuse University) |
| Lessons Learned from Formal Verification of Lattice-Based Post-Quantum Cryptography in Software: From C to Rust Reza Azarderakhsh (FAU and PQSecure) |
| Towards Autoformalization of LLM-Generated Outputs for Requirement Verification Mihir Gupte and Ramesh S. (General Motors) |
| Trustworthy Autonomy: Logic Meets Learning for Safety-Critical Systems Aniruddh Puranic (University of Maryland College Park) |
| Vibes to Verification Balaji Rao (Stevens Institute of Technology) |
Tuesday
| The ARCOS Tool Portal: An Enabling Infrastructure for Hands-On Software Assurance Tools Exploration Yogesh Barve and Katie Dey (Vanderbilt University) |
| Formal Methods Approaches at Kestrel Grant Jurgensen and Eric Smith (Kestrel Institute) |
| Establishing Trust in Hidden Communication Systems Olivier Savary Bélanger (Galois), John Cyphert (STR), and Kevin Batz (Cornell University) |
| High-assurance Agentic AI Frameworks Tyler Smith and Benoit Razet (Galois) |
| Research @ Galois: Driven by Curiosity / Ground in Proof Brad Martin (Galois) |
Wednesday
| Automated Porting of C/C++ to CHERI Memory-Safe Hardware David Musliner (SIFT) |
| Combinatorial Methods for Functional Verification and Hardware Vulnerability Detection M S Raunak and Rick Kuhn (National Institute of Standards and Technology (NIST)) |
| Cyber knowledge representation for collaborative tiered cyber-reasoning Gregory Briskin (Trusted Science and Technology) |
| Modeling and Analysis of Weird Networks using Probabilistic Timed Automata Ian Blumenfeld, Andrew Chen, Andrew Choe, Yakir Forman, Manasvi Parikh, Lucas Peña, Kyle Treubig, Paul Vines, Jared Ziegler (Two Six Technologies) Adam Mendenhall, Thomas Wahl (Trusted Science and Technology) |
| Quantifying Side Channel Leakage with Probabilistic Abstract Interpretation Keara Hill (Binghamton University) |
| Software Understanding for National Security (SUNS): Closing the Software Understanding Gap Douglas Ghormley and Christopher Harrison (Sandia National Labs) |
| Safe Integration of AI for Cryptographic Protocol Analysis Paul Rowe and Andres Molina-Markham (MITRE) |
![]()