FMATS2 is the successor to FMATS. Like its predecessor, it aims to inspire research in the application of formal methods and tools to security. This year the organisers are from INRIA, CESG, Microsoft and the University of Cambridge.
FMATS resulted in at least one research collaboration that would not have happened without the workshop. We hope FMATS2 will generate more such collaborations. We think this will be helped if we again have participants with a wide range of backgrounds and the organisers do their best to ensure all the presentations are accessible to everyone.
The workshop is free, but participants are expected to cover their own travel and subsistence costs. We currently have a bit over thirty participants, which is close to what we are aiming for.
The workshop is not intended for conference style presentations of technical papers, though it will provide an opportunity for specialised one-to-one discussions (either in the new MSR building or in the many cafes and coffee shops within easy walking distance).
As participants have very varied backgrounds, they may not be familiar with particular theories or techniques, so the presenters are asked to be very gentle with technical details and concentrate on goals. The idea is that high-bandwith technical person-to-person discussions are provoked by the talks, but the talks themselves are suitable for everyone
We are hoping that some students can come to the workshop and have an opportunity to display posters showing the work and/or contribute to birds of a feather (BOF) sessions.
The timetable below may continue to change.
Morning of February 4 09:00-10:00 Coffee, welcome and schmoozing 10:00-11:00 George Danezis: Tutorial on machine learning and traffic analysis 11:00-11:30 Coffee break 11:30-12:00 Bart Jacobs (details TBA) 12:00-12:30 James Cheney: Provenance and security 12:30-14:00 Lunch Afternoon of February 4 14:00-14:30 Sean Weaver: Cryptol and its applications 14:30-15:00 Erik Poll, Sicco Verwer: Automated reverse engineering of security protocols 15:00-15:30 Graham Steel: Mac In The Box 15:30-16:00 Tea break 16:00-16:30 Mark Ryan: Protected execution: model and analysis 16:30-17:00 Jeremy Jacob: Embedding confidentiality assertions in specifications 18:30-21:00 Drinks from 18:30 and buffet dinner from 19:00 in the Meade Room in the University Centre Morning of February 5 08:30-09:00 Coffee and schmoozing 09:00-10:00 Overview of CESG research initiatives (speakers TBA) 10:00-10:30 Dusko Pavlovic: Overview of ASECOLAB.org 10:30-11:00 Coffee break 11:00-11:30 Gareth Smith: A trusted JavaScript semantics 11:30-12:00 Janet Barnes (details TBA) 12:00-12:30 Shiu-Kai Chin: Mission Assurance in Cyberspace 12:30-14:00 Lunch Afternoon of February 5 14:00-14:30 Dino Distefano: Future research ideas 14:30-15:30 BoF (poster presentations, future research discussions ...) 15:30-16:00 Tea break 16:00-17:00 BoF continues 17:00 End of Workshop.