Layered Assurance Workshop (LAW) »

Program (PDF)

Proceedings

Keynote and Invited Speakers

Monday Dec 9th 2013

7:30 - 8:30 BREAKFAST
8:30 - 8:45 Welcome and Opening Remarks
Rance DeLong, LAW General Chair
Gabriela Ciocarlie, SRI International, LAW Program Chair
Peter G. Neumann, SRI International, LAW Panels Chair
8:45 - 10:00 Keynote: Contract-based Design: a Temporal Logics Approach   [extended abstract]
Alessandro Cimatti, Fondazione Bruno Kessler
10:00 - 10:30 BREAK
10:30 - 12:00 Contributed Papers (45 minutes each)
Data Flow Analysis of a Xen-based Separation Kernel - David Greve, Steven VanderLeest
Supporting Safety Evaluation Process using AADL - Julien Delange, Peter Feiler
12:00 - 13:30 LUNCH
13:30 - 15:00 Panel: Ongoing R&D in Compositional Trustworthiness
Moderated by Peter G. Neumann, SRI International
Alessandro Cimatti - Fondazione Bruno Kessler
Nirav Dave' - SRI International
Rance DeLong - The Open Group
Zhong Shao - Yale University
15:00 - 15:30 BREAK
15:30 - 16:45 Invited Talk: Compositional Specification and Verification of a Hypervisor OS Kernel
Zhong Shao, Yale University
16:45 -17:45 Open Forum:  A Holistic Approach to Compositional Trustworthiness
Moderated by Peter G. Neumann, SRI International
17:45 - 18:30 Birds-of-a-Feather Session

Tuesday Dec 10th 2013

7:30 - 8:30 BREAKFAST
8:30 - 8:45 Day 2 Opening Remarks
8:45 - 10:00 Keynote: An Integrated Approach to Safety and Security based on Systems Theory
Nancy Leveson, Massachusetts Institute of Technology
10:00 - 10:30 BREAK
10:30 - 12:00 Panel: What can Safety and Security Teach Each Other?
Moderated by Peter G. Neumann, SRI International
Nancy Leveson, Massachusetts Institute of Technology
John Rushby, SRI International
David Greve, Rockwell Collins
William Edward Young, Massachusetts Institute of Technology
12:00 - 13:30 LUNCH
13:30 -15:00 Contributed Papers (45 minutes each)
A Taxonomy for Attack Patterns on Information Flows in Component-Based Operating Systems - Michael Hanspach, Joerg Keller
Creating Formally Verified Components for Layered Assurance with an LLVM to ACL2 Translator - Jennifer Davis, David Hardin, Jedidiah McClurg
15:00 - 15:30 BREAK
15:30 - 16:45 Invited Talk: Explaining Certification
John Rushby, SRI International
16:45 - 17:45 Works-In-Progress (15 minutes each)
Analyzing a Multi-Legged Argument Using Eliminative Argumentation - John Goodenough,  Ari Klein, Neil Ernst, Charles Weinstock, Software Engineering Institute, CMU
Security Architecture Cost-Benefit Model - Mark O. Scott, Northrop Grumman
Toward an Engineering Process for Certified Multilayer Cloud Services - Rajesh Harjani, Antonio Maña, Marcos Arjona, Antonio Muñoz Gallego, University of Malaga
Distributed MILS - Rance DeLong, The Open Group
17:45
Closing Remarks
18:00 - 20:00 Reception
Additional ACSA Events:
NSPW – New Security Paradigms Workshop
LASER – Learning from Authoritative Security Experiment Results