High Confidence Software and Systems (HCSS) Conference

to
A world class community of researchers gather each year for a full week of High Confidence Software and Systems Conference activities that are structured to focus on new scientific and technological foundations that can enable entirely new generations of engineered designs that are becoming essential for effectively operating life–, safety–, security–, and mission–critical systems. 

Schedule

· Sessions
Check-In and Networking
Pop in to one of the session rooms to say hello to other attendees
· Sessions
HCSS 20th Anniversary Panel
Panelists: Mark Jones, John Launchbury, Brad Martin, and Matt Wilding
· Sessions
Run-Time Assurance Architecture for Learning-Enabled Systems
Darren Cofer (Collins Aerospace)
· Sessions
Break, Breakouts, & Networking
Hop in to one of the discussion rooms or try your luck with chat roulette (Networking)
· Sessions
Keynote Presentation: IDAS: Intent-Defined Adaptive Software ARCOS: Automated Rapid Certification of Software
Ray Richards (DARPA)
· Sessions
Actionable definition of Safety Design Patterns using AADLv2, ALISA and the Error Modeling Annex
Jérôme Hugues (CMU/SEI)
· Sessions
Break, Breakouts, & Networking
Hop in to one of the discussion rooms or try your luck with chat roulette (Networking)
· Sessions
Keynote Presentation: Take a SEAT: Security-Enhancing Architectural Transformations
Konrad Slind (Collins Aerospace)
· Sessions
A Verified Optimizer for Quantum Circuits
Robert Rand (University of Chicago)
· Sessions
Cryptographic Protocol Verification in AWS
Adam Petcher (AWS)
· Sessions
Breakouts, & Networking
Hop in to one of the discussion rooms or try your luck with chat roulette (Networking)
· Sessions
Check-In and Networking
Pop in to one of the session rooms to say hello to other attendees
· Sessions
Keynote Presentation: Trustworthy AI
Jeannette M. Wing (Columbia)
· Sessions
Improving Computer Security by Understanding Cognitive Security
Kimberly Ferguson-Walter (NSA's Laboratory for Advanced Cybersecurity Research)
· Sessions
Break, Breakouts, & Networking
Hop in to one of the discussion rooms or try your luck with chat roulette (Networking)
· Sessions
The Changing Face of Computational Propaganda: AI, Encryption, Geofencing and the Manipulation of Public Opinion
Samuel Woolley (University of Texas, Austin)
· Expo
Poster Session
· Sessions
Breakouts and Networking
· Sessions
Check-In and Networking
Pop in to one of the session rooms to say hello to other attendees
· Sessions
PANEL: [email protected] Workshop Summary
Patrick Lincoln, Brad Martin, and Bill Scherlis
· Sessions
Integration Challenges in Static Analysis and Verification
Stephen Magill (MuseDev)
· Sessions
Break, Breakouts, & Networking
· Sessions
Formal Verification of Production Distributed Protocols
Mike Dodds (Galois)
· Sessions
Verifying C++ at Scale
Gregory Malecha (BedRock Systems)
· Sessions
Analysis of the Secure Remote Password Protocol Using CPSA
Erin Lanus (Virginia Tech)
· Sessions
Break, Breakouts, & Networking
· Sessions
3C: Interactive Conversion of C to Checked C
Michael Hicks (Correct Computation Inc. / University of Maryland)
· Sessions
Adapting to demand: seL4 proofs and proof engineering practice
Matthew Brecknell (Data61, CSIRO, Australia)
· Sessions
Breakouts and Networking
· Sessions
Check-In and Networking
Pop in to one of the session rooms to say hello to other attendees
· Sessions
Keynote Presentation: Distributed and Trustworthy Automated Reasoning
Marjin Heule (Carnegie Mellon University)
· Sessions
Geometric Path Enumeration Methods for Verifying ReLU Neural Networks
Stanley Bak (Stony Brook University / Safe Sky Analytics)
· Sessions
Break, Breakouts, & Networking
· Sessions
Scaling Continuous Verification
Joey Dodds (Galois)
· Sessions
End-to-End Verification of Initial and Transition Properties of GR(1) Designs Generated by Salty in SPARK
Laura Humphrey (AFRL)
· Sessions
Scalable Sound Static Analysis of Real-world C Applications using Abstract Interpretation
Henny Sipma (Kestrel Technology)
· Sessions
Break, Breakouts, & Networking
· Sessions
Automated Analysis of AWS Access Control
Andrew Gacek (AWS)
· Sessions
Code-Level Model Checking in the Software Development Workflow
Daniel Schwartz-Narbonne (AWS)
· Sessions
Breakouts and Networking

Speakers

Paul E. Black
Paul E. Black

NIST

Ray Richards
Ray Richards

Keynote

Brad Martin
Brad Martin

Technical director within NSA’s Laboratory for Advanced Cybersecurity Research

Darren Cofer
Darren Cofer

Fellow in the Trusted Systems group at Collins Aerospace

John Launchbury
John Launchbury

Galois

Sam Woolley
Sam Woolley

UT Austin

Matthew Brecknell
Matthew Brecknell

Data61, CSIRO, Australia

Robert Rand
Robert Rand

University of Chicago

Mark Jones
Mark Jones

Portland State University

Andrew Gacek
Andrew Gacek

Amazon Web Services

Henny Sipma
Henny Sipma

Kestrel Technology, LLC

Laura Humphrey
Laura Humphrey

Air Force Research Laboratory

Joey Dodds
Joey Dodds

Galois

Stanley Bak
Stanley Bak

Safe Sky Analytics LLC

Marijn Heule
Marijn Heule

Carnegie Mellon University

Michael Hicks
Michael Hicks

Correct Computation Inc and University of Maryland

Gregory Malecha
Gregory Malecha

BedRock Systems

David Burke
David Burke

Galois

Jeannette Wing
Jeannette Wing

Columbia

Konrad Slind
Konrad Slind

Collins Aerospace

Jerome Hugues
Jerome Hugues

CMU/SEI

Philomena Zimmerman
Philomena Zimmerman

Office of the USD R&E

Matt Wilding
Matt Wilding

Collins Aerospace

The event is over

Hosted by

2020 HotSoS Symposium Organizers

We host academic conferences centered around cyber-physical systems, robotics, and the science of security.

Booths

Lindsay Errington

Lindsay Errington

A New Kind of Program Logic

Anwar Mamat

Anwar Mamat

Affix: Micro-executing Binaries to Produce Static Analysis Models

Srini Srinivasan

Srini Srinivasan

Architecture Modeling for Resource Margin Estimation

Irena Bojanova & Carlos Galhardo

Irena Bojanova & Carlos Galhardo

Memory Bugs Classes in the NIST Bugs Framework (BF)

Yiannis Kantaros

Yiannis Kantaros

VisionGuard: Runtime Detection of Adversarial Inputs to Perception Systems