| |
MONDAY, MAY 7 Trusting Autonomy |
TUESDAY, MAY 8 Complex Heterogeneous Systems |
WEDNESDAY, MAY 9 Blockchain |
| 0900 - 1000 |
Keynote Presentation: Assured Autonomy Sandeep Neema (DARPA) |
Keynote Presentation: A Four Pillar Improvement Strategy to Qualification of Embedded Software Systems Peter H. Feiler (SEI) |
Keynote Presentation: Challenges Ahead for Blockchains Emin Gün Sirer (Cornell) |
| 1000 - 1030 |
Data-driven Safe Control of Nonlinear Systems Susmit Jha (SRI International) |
Perspectives on Applying the Safety Case Approach for the Assurance of Complex Heterogeneous Systems Ewen Denney (SGT / NASA Ames) |
On the Emerging Trend of Computer-Aided Cryptology and the Technology Transition Gap it Presents Evan Austin (SPAWAR Systems Center Atlantic) |
| 1030 - 1100 |
BREAK |
BREAK |
BREAK |
| 1100 - 1130 |
Using Formal Methods to Reason About Neural Network Based Autonomous Systems Stephen Magill (Galois, Inc.) |
Principles of Layered Attestation Paul Rowe (The MITRE Corporation) |
Applying Symbolic Execution to Blockchain Applications Mark Mossberg (Trail of Bits) |
| 1130 - 1145 |
Towards Formally Verified Deep Neural Networks Clark Barrett (Stanford University) |
Architecture-Driven Assurance for Model-Based Systems Engineering Darren Cofer (Rockwell Collins) |
| 1145 - 1200 |
Resilient and Trustworthy Transactive Platform for Smart and Connected Communities Aron Laszka (University of Houston) |
| 1200 - 1215 |
LUNCH (on your own) |
LUNCH (on your own) |
| 1215 - 1245 |
Case Study: Verifying Safety of a UUV Heading PID Controller Daniel Genin (JHU APL) |
| 1245 - 1330 |
Confernence Adjourned |
| 1330 - 1415 |
Invited Presenter: Growing Risk of Cyber Attacks Vinh Nguyen (ODNI) |
Invited Presenter: The Future of Cyber-autonomy David Brumley (ForAllSecure / CMU) |
| 1415 - 1500 |
POSTER SESSION / BREAK
|
POSTER SESSION / BREAK
|
| 1500 - 1530 |
Intrusion and Anomaly Detection in Autonomous Vehicle Systems Sam Lauzon (University of Michigan - Transportation Research Institute) |
Model-based System Certification – A Vision Jérôme Hugues (ISAE Supaero) |
| 1530 - 1600 |
The KeYmaera X Theorem Prover: Hybrid Systems Verification and Verified Runtime Validation Stefan Mitsch (CMU) |
VeriCores: Cyber-Instrumenting Devices Built from Verified Components David Hardin (Rockwell Collins) |
| 1600 - 1630 |
Safe Pointers and Verifiable Automatic Heap Management without Garbage Collection S. Tucker Taft (AdaCore) |
High-Assurance Blockchains: Applications and Verification Joe Hendrix (Galois, Inc) |
| 1630 |
Adjourn for the Day |
Adjourn for the Day
|
| 1830 |
Conference Dinner
The Chart House 300 2nd Street Annapolis, MD 21403 |