While the fields of security and privacy and of formal methods/programming languages are thriving areas of computer science, the communities are mostly disjoint, and though there are several formal techniques used for ensuring security, there is no systematic use of emerging powerful formal techniques in the real world to ensure security and privacy.

The goal of this workshop is to bring together researchers from both communities in order to have them learn about the important problems and relevant techniques in each field, to foster collaboration leading to applying “cutting edge” formal techniques in security. We will have a mix of refereed papers and invited talks. Invited talks will be from people who have successfully bridged these fields and on topics that highlight important problems in security (system security, information security, malware, etc.) that could benefit from formal techniques (programming language paradigms, verification, model-checking, efficient constraint solving, synthesis, etc.).

The workshop will consist of selected refereed papers, invited talks, discussion sections on specialized topics, and panel discussions.

Program:

The program will be posted soon. There are three invited talks:

  • Nikhil Swamy, Microsoft Research

  • Andrew Appel, Princeton University

  • Andrew Myers, Cornell University

There will also be one accepted paper presented:

  • A Recursive Strategy for Symbolic Execution to Find Exploits in Hardware Designs, by Rui Zhang and Cynthia Sturton
You're viewing the program in a time zone which is different from your device's time zone change time zone

Mon 18 Jun

Displayed time zone: Eastern Time (US & Canada) change

09:00 - 10:30
Morning Session IFMS at Discovery C
09:15
75m
Talk
Designing hardware to be free of covert channels by construction
FMS
Andrew Myers Cornell University
11:00 - 12:15
Morning Session IIFMS at Discovery C
11:00
75m
Talk
Everest: Verifying and Deploying Secure Components in the HTTPS Ecosystem
FMS
Nikhil Swamy Microsoft Research
16:10 - 17:25
Breakout sessions/PanelFMS at Discovery C
16:10
60m
Meeting
Breakout sessions / Discussion
FMS

17:10
15m
Meeting
Wrapup
FMS

Call for Papers

While the fields of security and privacy and of formal methods/programming languages are thriving areas of computer science, the communities are mostly disjoint, and though there are several formal techniques used for ensuring security, there is no systematic use of emerging powerful formal techniques in the real world to ensure security and privacy.

The goal of this workshop is to bring together researchers from both communities in order to have them learn about the important problems and relevant techniques in each field, to foster collaboration leading to applying “cutting edge” formal techniques in security. We will have a mix of refereed papers and invited talks. Invited talks will be from people who have successfully bridged these fields and on topics that highlight important problems in security (system security, information security, malware, etc.) that could benefit from formal techniques (programming language paradigms, verification, model-checking, efficient constraint solving, synthesis, etc.).

The workshop will consist of selected refereed papers, invited talks, discussion sections on specialized topics, and panel discussions.

Submissions

Submissions must be in English. papers should be in PDF and format and no more than 8 pages in standard two-column SIGPLAN conference format including figures and tables but excluding references. Shorter submissions are welcome. The submissions will be judged based on the merit of the ideas rather than the length. Submissions must be made through the online submission site.

All accepted papers will appear in the published proceedings and available on the ACM Digital Library. Authors will have the option of having their final paper accessible from the workshop website as well.

Authors must be familiar with and abide by SIGPLAN’s republication policy, which forbids simultaneous submission to multiple venues and requires disclosing prior publication of closely related work.

Important Dates:

  • Paper submissions: April 27th (EXTENDED DEADLINE)
  • Notification of authors: May 4, 2018
  • Camera-ready copies due: May 10, 2018 (anywhere on earth)
  • Workshop date: June 18, 2018

Program:

The program will be posted soon. There are three invited talks: * Nikhil Swamy, Microsoft Research * Andrew Appel, Princeton University * Andrew Myers, Cornell University

There will also be one accepted paper presented: * A Recursive Strategy for Symbolic Execution to Find Exploits in Hardware Designs By Rui Zhang and Cynthia Sturton