Second Workshop on Formal Methods And Tools for Security (FMATS2)


Venue: Microsoft Research Cambridge (note new location: 21 Station Road, Cambridge CB1 2FB, UK). When you arrive at the Microsoft Research Building you'll find the reception at the front. If you are driving, the nearest car park is the NCP multi-storey located in the Leisure Park.

Dates: February 4-5, 2013

Organisers: Andy Gordon, Mike Gordon (local arrangements), Andy Jackson, Graham Steel

FMATS2 is the successor to FMATS. Like its predecessor, it aims to inspire research in the application of formal methods and tools to security. This year the organisers are from INRIA, CESG, Microsoft and the University of Cambridge.

FMATS resulted in at least one research collaboration that would not have happened without the workshop. We hope FMATS2 will generate more such collaborations. We think this will be helped if we again have participants with a wide range of backgrounds and the organisers do their best to ensure all the presentations are accessible to everyone.

The workshop is free, but participants are expected to cover their own travel and subsistence costs. We currently have a bit over thirty participants, which is close to what we are aiming for.

The workshop is not intended for conference style presentations of technical papers, though it will provide an opportunity for specialised one-to-one discussions (either in the new MSR building or in the many cafes and coffee shops within easy walking distance).

As participants have very varied backgrounds, they may not be familiar with particular theories or techniques, so the presenters are asked to be very gentle with technical details and concentrate on goals. The idea is that high-bandwith technical person-to-person discussions are provoked by the talks, but the talks themselves are suitable for everyone

We are hoping that some students can come to the workshop and have an opportunity to display posters showing the work and/or contribute to birds of a feather (BOF) sessions.

The timetable below may continue to change.

Morning of February 4
    09:00-10:00   Coffee, welcome and schmoozing
    10:00-11:00   George Danezis: Tutorial on machine learning and traffic analysis

    11:00-11:30   Coffee break

    11:30-12:00   Bart Jacobs (details TBA)
    12:00-12:30   James Cheney: Provenance and security

    12:30-14:00   Lunch

Afternoon of February 4

    14:00-14:30   Sean Weaver: Cryptol and its applications
    14:30-15:00   Erik Poll, Sicco Verwer: Automated reverse engineering of security protocols
    15:00-15:30   Graham Steel: Mac In The Box

    15:30-16:00   Tea break

    16:00-16:30   Mark Ryan: Protected execution: model and analysis
    16:30-17:00   Jeremy Jacob: Embedding confidentiality assertions in specifications

    18:30-21:00   Drinks from 18:30 and buffet dinner from 19:00 in the Meade Room in the University Centre

Morning of February 5
    08:30-09:00   Coffee and schmoozing
    09:00-10:00   Overview of CESG research initiatives (speakers TBA)
    10:00-10:30   Dusko Pavlovic: Overview of ASECOLAB.org

    10:30-11:00   Coffee break

    11:00-11:30   Gareth Smith: A trusted JavaScript semantics
    11:30-12:00   Janet Barnes (details TBA)
    12:00-12:30   Shiu-Kai Chin: Mission Assurance in Cyberspace

    12:30-14:00   Lunch

Afternoon of February 5
    
    14:00-14:30   Dino Distefano: Future research ideas
    14:30-15:30   BoF (poster presentations, future research discussions ...)
    
    15:30-16:00   Tea break

    16:00-17:00   BoF continues

    17:00         End of Workshop.

 


Maintained by Mike Gordon.
This page last updated by Mike on Thu Jan 31 2013.