|
Monday, September 25, 2017
|
8:00 AM - 9:00 AM
|
|
9:00 AM - 10:30 AM
|
|
|
10:30 AM - 10:45 AM
|
|
10:45 AM - 12:15 PM
|
|
|
12:15 PM - 1:45 PM
|
|
1:45 PM - 3:15 PM
|
|
|
3:15 PM - 3:30 PM
|
|
3:30 PM - 5:00 PM
|
|
|
Tuesday, September 26, 2017
|
7:45 AM - 8:15 AM
|
|
8:15 AM - 8:30 AM
|
|
8:30 AM - 9:15 AM
|
|
9:20 AM - 10:05 AM
|
|
10:05 AM - 10:25 AM
|
Break & NIST Technology Poster Session
|
|
10:25 AM - 11:10 AM
|
Cyber Threat Event Notification Challenges – A Reusable Design and Implementation Approach
Dan Kahn
|
Cybersecurity and Information Assurance: Technological Approaches to Achieve Software and Mission Assurance
Kenneth Nidiffer
|
Getting Early Visibility into Your Program Metrics using a Dashboard Approach
Michael Bandor
Thomas Merendino
|
Organizing to Execute in Agile Environments
Christopher Alexander
Brian Rivera
|
Finding Bugs in Cryptographic Hash Function Implementations
M Raunak
Nicky Mouha
|
11:15 AM - 12:00 PM
|
Trends in Vulnerabilities
Richard Kuhn
M Raunak
|
From Continuous Integration to Continuous Assurance
Barton Miller
Vamshi Basupalli
Josef Burger
James Kupsch
|
Security Measurement - building confidence that the system is secure
Carol Woody
|
A Reverse Chronology of Evolutionary Architecture and Agile Development
Thomas Mielke
Brian Gallagher
Mostafa Hanif
|
Increasing Test Efficiency with Automated Feature-Interaction-Testing
Sven Dominka
Dominik Ertl
Florian Schramml
Michael Mandl
Michael Duebner
|
12:00 PM - 1:05 PM
|
|
1:05 PM - 1:50 PM
|
Cyber Defense via Event-Based Modeling
Joey Rivera
|
Software Supply Chain Management: Reducing Attack Vectors and Enabling Cybersecurity Assurance
Joe Jarzombek
|
Software Assurance Reference Dataset (SARD): 171,000 Test Programs and Growing
Paul E. Black
|
CMMI and Agile Development - A Binary Choice?
Arlene Minkiewicz
|
–
|
2:00 PM - 2:45 PM
|
–
|
Integrating Requirements Management and Requirements Modeling – A Model-Based Approach
William Fetech
|
How Software Cost Estimators Select Size Metrics: Preliminary Survey Results
Anandi Hira
Barry Boehm
|
Can Agile Methodology Survive without DevOps Techniques?
Hasan Yasar
|
Automated Test Generation for High MC/DC Using Guided Concolic Testing
W. Eric Wong
Ruizhi Gao
Linghuan Hu
Richard Kuhn
Raghu Kacker
|
2:45 PM - 3:05 PM
|
|
3:05 PM - 4:45 PM
|
|
Wednesday, September 27, 2017
|
8:30 AM - 9:15 AM
|
|
9:20 AM - 10:05 AM
|
|
10:05 AM - 10:25 AM
|
|
10:25 AM - 11:10 AM
|
Cryptography Classes in Bugs Framework (BF): Encryption (ENC), Verification (VRF), and Key Management (KMN)
Irena Bojanova
Paul E. Black
Yaacov Yesha
|
Building the NoT Graph
George Hurlburt
|
Comparing JIRA and Bugzilla for Software Project Tracking and Data Collection
Barry Boehm
Anandi Hira
Alexey Tregubov
Shreya Sharma
Sultan Alsarra
|
Technical Odysseus: The Challenges of Implementing the Technical Odyssey that is the Internet of Things (IOT)
Michael Staufenberg
|
Training and Certifying Security Testers Beyond Penetration Testing
Randall Rice
|
11:15 AM - 12:00 PM
|
Observations on the Software Sustainment Challenge
Michael McLendon
|
Extending Model-Based System Engineering using DIS
Julian Rodriguez
Jacob Harris
|
Measuring a System’s Cyber Security Risk
Linda Wilbanks
|
Location tracking and content monitoring of fluid tankers with IoT Cloud
Ashwani Singh
Vivek Varma
John Cranfill
|
Covering Arrays: Evaluating coverage and diversity in the presence of disallowed combinations
Joseph Morgan
Ryan Lekivetz
Tom Donnelly
|
12:00 PM - 1:05 PM
|
|
1:05 PM - 1:50 PM
|
A Unicode Based CAPTCHA Scheme
Gursev Singh Kalra
|
Owning the Technical Requirements Baseline using IBM DOORS
William Fetech
|
A Lightweight Incremental Effort Estimation Model for Use Case Driven Projects
Kan Qi
Barry Boehm
|
Agile and Other Trends in Software Engineering
M Raunak
David Binkley
|
Guidance for Introducing Formal Methods into a Software Verification Infrastructure
Benjamin Brosgol
|
2:00 PM - 2:45 PM
|
Reducing Software Vulnerabilities – The “Vital Few” Process and Product Metrics
Girish Seshagiri
|
Configurable Advanced Verification of Software: A Prototype Tool for Generating and Executing Test Cases from UML-based Interface Behavior Descriptions
Alan Thomas
John Kimball
|
Using Software Readability for Software Maintainability: A Case Study on Unified Code Count
Celia Chen
Anandi Hira
Barry Boehm
|
–
|
Combinatorial Coverage Measurement of Test Vectors used in Cryptographic Algorithm Validation
Rick Kuhn
Dimitris Simos
|
2:45 PM - 3:05 PM
|
|
3:05 PM - 3:50 PM
|
NDIA Workshop on Department of Defense and Industry Software Assurance Challenges and Capability Gaps Analysis
Thomas Hurt
|
Software Development for Medical Devices: State of Practice
Mohamad Kassab
|
Tilting at Windmills: The Need to Reboot Software Development
Andrew Murren
|
Harnessing the Power of the Crowd
Arlene Minkiewicz
|
Using MC/DC as a Black-Box Testing Technique
Sergiy Vilkomir
John Baptista
Gourav Das
|
4:00 PM - 4:45 PM
|
Assessing Software Supply Chain Risk Using Public Data
Sebastian Benthall
|
System Analysis Enhances Microservice Adoption and Effectiveness
Pavel Rabinovich
|
How Does Contributors’ Involvement Influence Open Source Systems
Kamonphop Srisopha
Barry Boehm
Pooyan Behnamghader
Reem Alfayez
|
On-premise ERPs talk to the REST of the Cloud using iPaaS
Ashwani Singh
John Cranfill
|
Efficient, Effective & Innovative Automated Software Test for the Acquisition Process
Darryl Ahner
|
Thursday, September 28, 2017
|
8:30 AM - 9:15 AM
|
|
9:20 AM - 10:05 AM
|
Defending Android Applications Availability
Suzanna Schmeelk
Alfred Aho
|
Rapid Realization of Executable Domain Models via Automatic Code Generation
Barry Boehm
Doug Rosenberg
Bo Wang
|
Data-Driven Management on a Large Software Intensive System: Insights and Lessons Learned
Madeline Diep
|
–
|
Can’t we just get along: Engineering Trade Decisions and the RMF at the System Level
Michele Moss
|
10:05 AM - 10:25 AM
|
|
10:25 AM - 11:10 AM
|
|
11:15 AM - 12:00 PM
|
|
12:00 PM - 12:15 PM
|
|