High Confidence Software and Systems Conference 2022 May 16, 2022 to May 16, 2022, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Welcome & Opening Remarks Patrick Pike N/A
KEYNOTE PRESENTATION: A Navy of Things: The Role of IoT at War Roger Kline N/A
High Assurance Rigorous Digital Engineering for Nuclear Safety (HARDENS) Joseph Kiniry In the **High Assurance Rigorous Digital Engineering for Nuclear Safety** (HARDENS) project, Galois has developed ...
Analyzing Code Stability Using Control Theoretic Techniques Jessa Lee Controller-Oriented Programming (COP) is a new programming language paradigm designed to enable the creation of ...
Cyber Assured Systems Engineering at Scale Darren Cofer Formal methods tools that provide mathematical proof of system properties have improved dramatically in their ...
Correct-by-Learning Methods for Reliable Control Sicun Gao Computing systems that engage us physically with high degrees of autonomy pose longstanding challenges to ...
A Method for Formal Verification of Neural Network Collision Avoidance Controller Daniel Genin We present an approach for verifying the safety of an autonomous system controller, such as ...
Model-checking State Machines In the Wild Vaibhav Sharma State machines are a compact representation of complex logical rules. State machines have diverse uses ...
Machine Learning and the Unknown Unknowns Darren Cofer One of the important certification objectives for airborne software is demonstrating the absence of unintended ...
KEYNOTE PRESENTATION: Limiting Weird Machines Thomas "halvar" Dullien N/A
Tiffin and MGen: An Expressive Policy Language with Multiple Runtime Monitoring Tools Zak Fry Runtime monitoring for anomalous behavior of software systems is a critical validation technique as part ...
Model Validation for DARPA DPRIVE Ian Blumenfeld Commodity hardware description languages (HDLs) like VHDL and Verilog present a challenge from a high ...
HCSS Formal Methods Education Panel Kevin W. Hamlen , Perry Alexander , Marijn Heule , Pete Shoshitaishvili N/A
Lifting Formal Proof to Practice via an Assurance Case Mark Thober Formal Methods (FM) are important for verifying properties of systems with mathematical rigor. FM tools ...
CSAADE: Cryptographically Secure, Automatic Assurance Software Development Environment Leonardo Babun The cyberattacks on the SolarWinds Orion products reinforce concerns about the vulnerability of the U.S. ...
Binary Software Composition Analysis with CodeSentry Antonio Flores Montoya Most modern software systems have significant third-party dependencies, which often contain exploitable vulnerabilities. Once a ...
Keynote: What Log4j teaches us about the Software Supply Chain Stephen Magill In December of 2021, exploit code for a high-severity zero-day vulnerability was released on GitHub. ...
P: Formal Modeling and Analysis of Distributed Systems Ankush Desai Distributed systems are notoriously hard to get right. Programming these systems is challenging because of ...
Reasoning about Deltas — Even Doing Nothing is Difficult Hira Syeda Formal software verification involves specifications, an implementation, and a proof that the implementation satisfies the ...
Evolving Verified Cloud Authorization Sean Mclaughlin Amazon Web Services (AWS) authorizes over 34 trillion requests per day [1]. AWS has a ...
Applying Formal Methods to Incident Recovery Aleksandar Chakarov Applications of formal methods (FM) usually focus on analyzing the possible executions of a system ...
Automated Evidence Generation for Continuous Certification Mauricio Castillo-effen This talk will introduce the methodological and tooling foundations of an automated evidence generation workbench ...
Lowering the Barrier to Formal Modeling and Analysis Daniel Balasubramanian Recent years have seen a significant increase in the application of formal methods to industrial ...
Proof, but at What Cost? Robin Salkeld Dafny is a verification-aware programming language that aims to make formal verification more accessible to ...
Scaling Formal Verification with Specification Extraction Edwin Westbrook Formal verification is a powerful tool for assuring software systems. By building machine-checked mathematical proofs ...
Keynote Presentation: Supply Chain Events: Hardware vs. Software Saverio Fazzari N/A
Unified Configuration Modeling Infrastructure Denis Gopan Modern software systems, ranging from home networks to nation-critical infrastructures, are assembled from general COTS ...
Formally Verifying Security and Compliance Mandates using AWS Network Access Analyzer Dan Dacosta Amazon Web Services (AWS) Customers use the Virtual Private Cloud service to virtually provision networks ...
Demystify your trust boundary with interactive refinement Vaibhav Sharma Automated reasoning can precisely answer questions about system behavior, but traditionally requires a huge up-front ...
Using lightweight formal methods to validate a key-value storage node in Amazon S3 James Bornholt This talk reports our experience applying lightweight formal methods to validate the correctness of ShardStore, ...
Fiat Cryptography: A Formally Verified Compiler for Finite-Field Arithmetic Adam Chlipala Fiat Cryptography is a formally verified compiler for cryptographic arithmetic code, bridging the gap between ...
Kani Rust Verifier Daniel Schwartz-narbonne Rust has made significant inroads as a popular safe systems programming language over the decade ...
Closing Remarks Lee Lincoln N/A