SAPLING 2015

November 20, 2015

SIT Lecture Theatre (Room 123), Building J12, The University of Sydney

Program

Talk slots are twenty minutes including questions.

09:25 Welcome

09:30-10:50 Session 1

Nicholas Hollingum, University of Sydney, Towards a Scalable Framework for Context-Free Language Reachability abstract slides

Gary Miller, UTS, The Prospects for Programming-Experience Design: On the Beauty of Language abstract slides

Scott Buckley, Macquarie, Web browsers as compilers abstract slides

Pongsak Suvanpong and Anthony Sloane, Macquarie, Evaluating Kiama Abstract State Machines for a Java Implementation abstract slides

10:50-11:10 Break

11:10-12:30 Session 2

Raghavendra K. R., Oracle Labs Brisbane, Issues in applying points-to analysis for large-scale Java library codebases abstract slides

James Noble, VUW, Delegation isn’t quite Inheritance: Objects, Classes and Initialisation in Grace abstract slides

Kunshan Wang, ANU, Draining the Swamp: Micro Virtual Machines as Solid Foundation for Language Development abstract

John Zhang, ANU, MuPy: A First Language Client for Mu Micro Virtual Machine abstract slides

12:30-14:00 Lunch

14:00-15:20 Session 3

G. Gange et al., Melbourne, Program analysis and machine arithmetic abstract

Pavle Subotic, UCL, Horn Clauses for Communicating Timed Systems abstract

David J. Pearce, VUW, Can we Verify C with Whiley? abstract slides

Yutaka Nagashima, NICTA, Try hard! Proof automation, efficient-proof-script reconstruction, and proof-planning in Isabelle using monads abstract slides

15:20-15:40 Break

15:40-17:00 Session 4

Francois Gauthier, Oracle Labs Brisbane, Static taint analysis of web applications: Haven't we solved this problem yet? abstract slides

Amos Robinson, Ambiata, Icicle: Write Once, Run Once abstract slides

Hayes et al., Queensland, Understanding Concurrent Programs using Rely-Guarantee Thinking abstract slides

Yi Lu, Paddy Krishnan, Raghavendra K. R., Oracle Labs, Brisbane, From Access Control to Information Flow: Security Model and Static Analysis for Detecting Java Security Vulnerabilities abstract slides

17:00 Wrap up