Program Day 3
09:30 Invited Talk: SMT in Verification, Modeling, and Testing at Microsoft,
Dr. Nikolaj Bjorner, Microsoft Research
Session Chair: Armin Biere, Johannes Kepler University
10:30 Break
11:00 Special Session on Security Verification
Session Chair: Alex Goryachev, IBM Research – Haifa
11:00 A Vulnerability or a Bug? What's the Difference Anyway? Security Software Verification as Part of the Development Lifecycle,
Ofer Maor, CTO, Quotium, and Global Membership Committee, OWASP
11:40 Formal Analysis of Security Data Paths in RTL Design,
Jamil Mazzawi, Consulting Services Manager, Jasper Design Automation
12:20 Simultaneous Information Flow Security and Circuit Redundancy in Boolean Gates,
Prof. Ryan Kastner, University of California, San Diego
13:00 Lunch
14:00 Technical Session 6: Formal Methods
Session Chair: Sharad Malik, Princeton University
14:00 Word Equations with Length Constraints: What's Decidable?,
Vijay Ganesh, Mia Minnes, Armando Solar-Lezama, and Martin Rinard
14:30 Environment-Friendly Safety,
Orna Kupferman and Sigal Weiner
15:00 Deterministic Compilation of Temporal Safety Properties in Explicit State Model Checking,
Kristin Yvonne Rozier and Moshe Vardi
15:30 Break
16:00 Award Session,
HVC Best Paper Award
16:15 HVC2012 Award: IC3 and Friends,
Prof. Aaron Bradley, CU Boulder
HVC2013 Kickoff
17:30 Conclusion
Keynote speakers
As in previous years, the post-conference proceedings will be published in Springer's Lecture Notes in Computer Science series (LNCS).