| High Assurance Rigorous Digital Engineering for Nuclear Safety (HARDENS) |
|
| Analyzing Code Stability Using Control Theoretic Techniques |
|
| Cyber Assured Systems Engineering at Scale |
|
| Correct-by-Learning Methods for Reliable Control |
|
| A Method for Formal Verification of Neural Network Collision Avoidance Controller |
|
| Model-checking State Machines in the Wild |
|
| Machine Learning and the Unknown Unknowns |
|
| Keynote Presentation: Thomas Dullien |
|
| Tiffin and MGen: An Expressive Policy Language with Multiple Runtime Monitoring Tools |
|
| Model Validation for DARPA DPRIVE |
|
| Lifting Formal Proof to Practice via an Assurance Case |
|
| CSAADE: Cryptographically Secure, Automatic Assurance Software Development Environment |
|
| Binary Software Composition Analysis with CodeSentry |
|
| Keynote: What Log4j teaches us about the Software Supply Chain |
|
| P: Formal Modeling and Analysis of Distributed Systems |
|
| Reasoning about Deltas — Even Doing Nothing is Difficult |
|
| Evolving Verified Cloud Authorization |
|
| Automated Evidence Generation for Continuous Certification |
|
| Lowering the Barrier to Formal Modeling and Analysis |
|
| Proof, but at What Cost? |
|
| Scaling Formal Verification with Specification Extraction |
|
| Keynote Presentation: Supply Chain Events: Hardware vs. Software |
|
| Unified Configuration Modeling Infrastructure |
|
| Formally Verifying Security and Compliance Mandates using AWS Network Access Analyzer |
|