Program (PDF)
Proceedings
Keynote and Invited Speakers
Monday Dec 9th 2013
7:30 - 8:30 | BREAKFAST |
8:30 - 8:45 | Welcome and Opening Remarks Rance DeLong, LAW General Chair Gabriela Ciocarlie, SRI International, LAW Program Chair Peter G. Neumann, SRI International, LAW Panels Chair |
8:45 - 10:00 | Keynote: Contract-based Design:
a Temporal Logics Approach [extended abstract] Alessandro Cimatti, Fondazione Bruno Kessler |
10:00 - 10:30 | BREAK |
10:30 - 12:00 | Contributed Papers
(45 minutes each) Data Flow Analysis of a Xen-based Separation Kernel - David Greve, Steven VanderLeest Supporting Safety Evaluation Process using AADL - Julien Delange, Peter Feiler |
12:00 - 13:30 | LUNCH |
13:30 - 15:00 | Panel: Ongoing R&D in
Compositional Trustworthiness Moderated by Peter G. Neumann, SRI International
|
15:00 - 15:30 | BREAK |
15:30 - 16:45 | Invited Talk: Compositional
Specification and Verification of a Hypervisor OS Kernel Zhong Shao, Yale University |
16:45 -17:45 | Open Forum: A
Holistic Approach to Compositional
Trustworthiness Moderated by Peter G. Neumann, SRI International |
17:45 - 18:30 | Birds-of-a-Feather Session |
Tuesday Dec 10th 2013
7:30 - 8:30 | BREAKFAST |
8:30 - 8:45 | Day 2 Opening Remarks |
8:45 - 10:00 | Keynote: An Integrated Approach
to Safety and Security based on Systems Theory Nancy Leveson, Massachusetts Institute of Technology |
10:00 - 10:30 | BREAK |
10:30 - 12:00 | Panel: What can Safety
and Security Teach Each Other? Moderated by Peter G. Neumann, SRI International
|
12:00 - 13:30 | LUNCH |
13:30 -15:00 | Contributed Papers
(45 minutes each) A Taxonomy for Attack Patterns on Information Flows in Component-Based Operating Systems - Michael Hanspach, Joerg Keller Creating Formally Verified Components for Layered Assurance with an LLVM to ACL2 Translator - Jennifer Davis, David Hardin, Jedidiah McClurg |
15:00 - 15:30 | BREAK |
15:30 - 16:45 | Invited Talk: Explaining Certification John Rushby, SRI International |
16:45 - 17:45 | Works-In-Progress (15
minutes each) Analyzing a Multi-Legged Argument Using Eliminative Argumentation - John Goodenough, Ari Klein, Neil Ernst, Charles Weinstock, Software Engineering Institute, CMU Security Architecture Cost-Benefit Model - Mark O. Scott, Northrop Grumman Toward an Engineering Process for Certified Multilayer Cloud Services - Rajesh Harjani, Antonio Maña, Marcos Arjona, Antonio Muñoz Gallego, University of Malaga Distributed MILS - Rance DeLong, The Open Group |
17:45 |
Closing Remarks |
18:00 - 20:00 | Reception |