HCSS 2016 - Program Agenda
  
DOWNLOAD PRINTER-FRIENDLY VERSION
2016 DAILY AGENDA
| TUESDAY, MAY 10  Reasoning / IP  | 
WEDNESDAY, MAY 11  Measuring Security  | 
THURSDAY, MAY 12  Uncertainty and Adaptive Systems  | 
|
| 0900 - 1000 | Keynote Presentation:  Verification Across Intellectual Property Boundaries Sagar Chaki (CMU-SEI)  | 
Keynote Presentation  Metric or English: Characterizing and Conveying Trustworthiness Fred B. Schneider (Cornell)  | 
Keynote Presentation:  Programming Uncertain <T>hings Kathryn McKinley (Microsoft Research)  | 
| 1000 - 1030 | The Science of Deep Specification  Benjamin Pierce (Penn)  | 
Build It Break It Fix It:  Measuring Secure Development Andrew Ruef (University of Maryland)  | 
Formal Verification of C Programs with Floating-Point Computations: Certified Error Bounds  for Signal Processing Tahina Ramananandro (Reservoir Labs Inc)  | 
| 1030 - 1100 | BREAK | BREAK | BREAK | 
| 1100 - 1130 | Interrupts in OS code:  let's reason about them. Yes, this means concurrency. June Andronick (Data61 and UNSW)  | 
Measuring Protocol Strength  with Security Goals Paul Rowe (The MITRE Corporation)  | 
Wigmore: A Constraint-Based Language for Reasoning About Evidence and Uncertainty  David Burke (Galois, Inc.)  | 
| 1130 - 1200 | Android Platform Modeling and Android App Verification  in the ACL2 Theorem Prover Eric W. Smith (Kestrel Institute)  | 
Combinatorial Coverage Analysis  of Subsets of the TLS Cipher Suite Registry Dimitris Simos (SBA Research)  | 
Formal Modeling and Analysis of Hierarchical Path Planning  Cesare Tinelli (The University of Iowa)  | 
| 1200 - 1330 | LUNCH  (on your own)  | 
LUNCH  (on your own)  | 
LUNCH  (on your own)  | 
| 1330 - 1400 | "It's QEDs All the Way Down"  David Hardin (Rockwell Collins)  | 
New Perspectives on Automated Vulnerability Discovery  Artem Dinaburg (Trail of Bits)  | 
Keynote Presentation:  Data and Decision Analytics Robert Bonneau (OSD)  | 
| 1400 - 1430 | Moving Hardware from  “Security through Obscurity” to “Secure by Design” Ryan Kastner (UCSD)  | 
Gradual Information Flow Control  Peter Thiemann (Universität Freiburg)  | 
|
| 1430 - 1500 | POSTER SESSION | POSTER SESSION | BREAK | 
| 1500 - 1530 | Automatic Software Verification  for High-Confidence Cyber-Physical Systems Miroslav Pajic (Duke University)  | 
||
| 1530 - 1600 | Learning State-Rich  Specifications from "Big Code" Swarat Chaudhuri (Rice University)  | 
TQL-1 Qualification of a Model-Based Code Generator  S. Tucker Taft (AdaCore)  | 
Safety-Constrained  Reinforcement Learning for MDPs Nils Jansen (UT Austin)  | 
| 1600 - 1630 | A String, Regular Expression,  and Integer Solver for Bug-finding and Security Yunhui Zheng (IBM)  | 
Collaboration and Automation for  Threat Assessment and Mitigation Dave Archer (Galois, Inc.)  | 
Confernence Adjourned  | 
| 1630 | Adjourn for the day | 
 Adjourn for the day 
  | 
|
| 1830 | Conference Dinner  The Chart House 300 2nd Street Annapolis, MD 21403  | 
