Program Day 3


09:30 Invited Talk: SMT in Verification, Modeling, and Testing at Microsoft,
Dr. Nikolaj Bjorner, Microsoft Research
Session Chair: Armin Biere, Johannes Kepler University

10:30 Break


11:00 Special Session on Security Verification
Session Chair: Alex Goryachev, IBM Research – Haifa


11:00 A Vulnerability or a Bug? What's the Difference Anyway? Security Software Verification as Part of the Development Lifecycle,
Ofer Maor, CTO, Quotium, and Global Membership Committee, OWASP

11:40 Formal Analysis of Security Data Paths in RTL Design,
Jamil Mazzawi, Consulting Services Manager, Jasper Design Automation

12:20 Simultaneous Information Flow Security and Circuit Redundancy in Boolean Gates,
Prof. Ryan Kastner, University of California, San Diego

13:00 Lunch


14:00 Technical Session 6: Formal Methods
Session Chair: Sharad Malik, Princeton University


14:00 Word Equations with Length Constraints: What's Decidable?,
Vijay Ganesh, Mia Minnes, Armando Solar-Lezama, and Martin Rinard

14:30 Environment-Friendly Safety,
Orna Kupferman and Sigal Weiner

15:00 Deterministic Compilation of Temporal Safety Properties in Explicit State Model Checking,
Kristin Yvonne Rozier and Moshe Vardi

15:30 Break

16:00 Award Session,
HVC Best Paper Award

16:15 HVC2012 Award: IC3 and Friends,
Prof. Aaron Bradley, CU Boulder

HVC2013 Kickoff

17:30 Conclusion

play gallery

HVC 2012 Photo gallery


Keynote speakers





Previous Conferences

As in previous years, the post-conference proceedings will be published in Springer's Lecture Notes in Computer Science series (LNCS).

HVC 2012 Poster

HVC 2012 Poster

%%sidebarspace%%
See us on Linked In See us on Facebook