IMPORTANT DATES
February 1, 2017 Abstract and optional full paper submission begins
May 26, 2017 Exhibit & Supporter registration opens
June 15, 2017 Abstract and optional extended abstract submission ends
June 29, 2017 Acceptance notifications sent
July 24, 2017 Submit final abstracts and presenter biographies
August 28, 2017 Submit final presentations and optional full papers

Schedule

Monday  |   Tuesday  |   Wednesday  |   Thursday  |   View All

Monday, September 25, 2017

TIME Half-day Tutorials
8:00 AM - 9:00 AM
Registration
9:00 AM - 10:30 AM
Big Data Literacy & Business Analytics

Lila Rajabion
Bhuvanesh Unhelkar

10:30 AM - 10:45 AM
Break
10:45 AM - 12:15 PM
(cont.)
Big Data Literacy & Business Analytics

Lila Rajabion
Bhuvanesh Unhelkar

12:15 PM - 1:45 PM
Lunch (on your own)
1:45 PM - 3:15 PM
3:15 PM - 3:30 PM
Break
3:30 PM - 5:00 PM
(cont.)
V-PKI Hits the Highway

Tim Weil


Tuesday, September 26, 2017

TIME Track 1 - Cyber Security Track 2 - Systems Engineering Track 3 - Metrics Track 4 - Agile Track 5 - Test and Verification
7:45 AM - 8:15 AM
Registration
8:15 AM - 8:30 AM
Opening Remarks
8:30 AM - 9:15 AM
Keynote: James Thompson, Director, Major Program Support, DASD/SE

James Thompson
9:20 AM - 10:05 AM
Keynote: Barry Boehm, Director, Center for Systems and Software Engineering, University of Southern California

Barry Boehm
10:05 AM - 10:25 AM
Break & NIST Technology Poster Session
10:25 AM - 11:10 AM
Cyber Threat Event Notification Challenges – A Reusable Design and Implementation Approach
Dan Kahn
Cybersecurity and Information Assurance: Technological Approaches to Achieve Software and Mission Assurance
Kenneth Nidiffer
Getting Early Visibility into Your Program Metrics using a Dashboard Approach
Michael Bandor
Thomas Merendino
Organizing to Execute in Agile Environments
Christopher Alexander
Brian Rivera
Finding Bugs in Cryptographic Hash Function Implementations
M Raunak
Nicky Mouha
11:15 AM - 12:00 PM
Trends in Vulnerabilities
Richard Kuhn
M Raunak
From Continuous Integration to Continuous Assurance
Barton Miller
Vamshi Basupalli
Josef Burger
James Kupsch
Security Measurement - building confidence that the system is secure
Carol Woody
A Reverse Chronology of Evolutionary Architecture and Agile Development
Thomas Mielke
Brian Gallagher
Mostafa Hanif
Increasing Test Efficiency with Automated Feature-Interaction-Testing
Sven Dominka
Dominik Ertl
Florian Schramml
Michael Mandl
Michael Duebner
12:00 PM - 1:05 PM
Lunch (Provided)
1:05 PM - 1:50 PM
Cyber Defense via Event-Based Modeling
Joey Rivera
Software Supply Chain Management: Reducing Attack Vectors and Enabling Cybersecurity Assurance
Joe Jarzombek
Software Assurance Reference Dataset (SARD): 171,000 Test Programs and Growing
Paul E. Black
CMMI and Agile Development - A Binary Choice?
Arlene Minkiewicz
2:00 PM - 2:45 PM
Integrating Requirements Management and Requirements Modeling – A Model-Based Approach
William Fetech
How Software Cost Estimators Select Size Metrics: Preliminary Survey Results
Anandi Hira
Barry Boehm
Can Agile Methodology Survive without DevOps Techniques?
Hasan Yasar
Automated Test Generation for High MC/DC Using Guided Concolic Testing
W. Eric Wong
Ruizhi Gao
Linghuan Hu
Richard Kuhn
Raghu Kacker
2:45 PM - 3:05 PM
Break
3:05 PM - 4:45 PM
Keynote Panel: Anita Carleton, Software Solutions Deputy Director, Software Engineering Institute, Carnegie Mellon University

Anita Carleton

Wednesday, September 27, 2017

TIME Track 1 - Cyber Security Track 2 - Systems Engineering Track 3 - Metrics Track 4 - Agile Track 5 - Test and Verification
8:30 AM - 9:15 AM
Keynote: BG (Retired) Gregory Touhill, President, the Cyxtera Federal Group
9:20 AM - 10:05 AM
Keynote: Kirk Botula, CEO, CMMI Institute

Kirk Botula
10:05 AM - 10:25 AM
Break
10:25 AM - 11:10 AM
Cryptography Classes in Bugs Framework (BF): Encryption (ENC), Verification (VRF), and Key Management (KMN)
Irena Bojanova
Paul E. Black
Yaacov Yesha
Building the NoT Graph
George Hurlburt
Comparing JIRA and Bugzilla for Software Project Tracking and Data Collection
Barry Boehm
Anandi Hira
Alexey Tregubov
Shreya Sharma
Sultan Alsarra
Technical Odysseus: The Challenges of Implementing the Technical Odyssey that is the Internet of Things (IOT)
Michael Staufenberg
Training and Certifying Security Testers Beyond Penetration Testing
Randall Rice
11:15 AM - 12:00 PM
Observations on the Software Sustainment Challenge
Michael McLendon
Extending Model-Based System Engineering using DIS
Julian Rodriguez
Jacob Harris
Measuring a System’s Cyber Security Risk
Linda Wilbanks
Location tracking and content monitoring of fluid tankers with IoT Cloud
Ashwani Singh
Vivek Varma
John Cranfill
Covering Arrays: Evaluating coverage and diversity in the presence of disallowed combinations
Joseph Morgan
Ryan Lekivetz
Tom Donnelly
12:00 PM - 1:05 PM
Lunch (Provided)
1:05 PM - 1:50 PM
A Unicode Based CAPTCHA Scheme
Gursev Singh Kalra
Owning the Technical Requirements Baseline using IBM DOORS
William Fetech
A Lightweight Incremental Effort Estimation Model for Use Case Driven Projects
Kan Qi
Barry Boehm
Agile and Other Trends in Software Engineering
M Raunak
David Binkley
Guidance for Introducing Formal Methods into a Software Verification Infrastructure
Benjamin Brosgol
2:00 PM - 2:45 PM
Reducing Software Vulnerabilities – The “Vital Few” Process and Product Metrics
Girish Seshagiri
Configurable Advanced Verification of Software: A Prototype Tool for Generating and Executing Test Cases from UML-based Interface Behavior Descriptions
Alan Thomas
John Kimball
Using Software Readability for Software Maintainability: A Case Study on Unified Code Count
Celia Chen
Anandi Hira
Barry Boehm
Combinatorial Coverage Measurement of Test Vectors used in Cryptographic Algorithm Validation
Rick Kuhn
Dimitris Simos
2:45 PM - 3:05 PM
Break
3:05 PM - 3:50 PM
NDIA Workshop on Department of Defense and Industry Software Assurance Challenges and Capability Gaps Analysis
Thomas Hurt
Software Development for Medical Devices: State of Practice
Mohamad Kassab
Tilting at Windmills: The Need to Reboot Software Development
Andrew Murren
Harnessing the Power of the Crowd
Arlene Minkiewicz
Using MC/DC as a Black-Box Testing Technique
Sergiy Vilkomir
John Baptista
Gourav Das
4:00 PM - 4:45 PM
Assessing Software Supply Chain Risk Using Public Data
Sebastian Benthall
System Analysis Enhances Microservice Adoption and Effectiveness
Pavel Rabinovich
How Does Contributors’ Involvement Influence Open Source Systems
Kamonphop Srisopha
Barry Boehm
Pooyan Behnamghader
Reem Alfayez
On-premise ERPs talk to the REST of the Cloud using iPaaS
Ashwani Singh
John Cranfill
Efficient, Effective & Innovative Automated Software Test for the Acquisition Process
Darryl Ahner

Thursday, September 28, 2017

TIME Track 1 - Cyber Security Track 2 - Systems Engineering Track 3 - Metrics Track 4 - Agile Track 5 - Test and Verification
8:30 AM - 9:15 AM
Keynote: Ram D. Sriram, Information Technology Laboratory, NIST

Ram D. Sriram
9:20 AM - 10:05 AM
Defending Android Applications Availability
Suzanna Schmeelk
Alfred Aho
Rapid Realization of Executable Domain Models via Automatic Code Generation
Barry Boehm
Doug Rosenberg
Bo Wang
Data-Driven Management on a Large Software Intensive System: Insights and Lessons Learned
Madeline Diep
Can’t we just get along: Engineering Trade Decisions and the RMF at the System Level
Michele Moss
10:05 AM - 10:25 AM
Break
10:25 AM - 11:10 AM
Keynote: Barry Horowitz, University of Virginia

Barry Horowitz
11:15 AM - 12:00 PM
Keynote: Jefferey Voas, National Institute of Standards and Technology

Jeffrey Voas
12:00 PM - 12:15 PM
Closing General Session
2017 Sponsors: IEEE and IEEE Computer Society