2 ~ 3 December 2024 - Hiroshima, Japan
Software fault prevention, verification, and validation are essential and important approaches to ensuring software productivity, reliability, and qualities. Fault prevention focuses on the issues of how to prevent the introduction and occurrence of faults in software systems. Verification is a means to rigorously check whether software systems satisfy their specification or properties. Validation refers to the technologies and activities for confirming whether the behavior and performance of software systems satisfy the user requirements. Various techniques and supporting tools have been developed to fulfill the tasks of software fault prevention, verification, and validation, but many difficulties and open problems remain unaddressed.
This symposium aims to invite researchers and practitioners working on software quality assurance to exchange ideas and to discuss how formal approaches, testing-based approaches, AI approaches, and their combinations can be studied, established, and supported to fulfill the goals of fault prevention, verification, and validation. All people who are interested in the topics mentioned above are welcome to submit papers and to participate in the symposium.
Authors are invited to submit technical papers describing original and unpublished work on, but not limited to, the following topics:
The 1st International Symposium on Software Fault Prevention, Verification, and Validation (SFPVV 2024) will take place at International Conference Center Hiroshima as a satellite event of ICFEM 2024.
The International Conference Center Hiroshima (ICCH) is located within Peace Memorial Park with the purpose of promoting international exchange and improving civic culture. Equipped with a large hall that can accommodate up to 1,504 people, an international conference hall, and large, medium and small conference rooms, the venue is ideal for concerts, lectures, domestic and international conferences, as well as exhibitions and corporate and organizational meetings. It is widely used for various purposes.
Distance from googlemap | Access from googlemap | |
---|---|---|
HOTEL MYSTAYS Hiroshima Peace Park | 450m | 7 minutes on foot |
THE KNOT HIROSHIOMA | 550m | 8 minutes on foot |
Dormy Inn Hiroshima | 650m | 10 minutes on foot |
ANA Crowne Plaza Hiroshima | 650m | 10 minutes on foot |
Comfort Hotel Hiroshima Otemachi | 800m | 11 minutes on foot |
Daiwa Roynet Hotel HIROSHIMA | 800m | 11 minutes on foot |
Mitsui Garden Hotel Hiroshima | 900m | 13 minutes on foot |
RIHGA Royal Hotel Hiroshima | 1.2km | 16 minutes on foot + train |
GRAND BASE Hiroshima Peace Memorial Park | 600m | 8 minutes on foot |
APA Hotel Hiroshima-Ekimae Ohashi | 2.5km | 20 minutes on foot + train |
Download the program here.
Kazuhiro Ogata received the B.S., M.S., and Ph.D. degrees in engineering from Keio University, in 1990, 1992, and 1995, respectively. He is currently a Professor with the Japan Advanced Institute of Science and Technology (JAIST), and the director with Research Center for Advanced Computing Infrastructure, JAIST. His research interest includes the applications of formal methods to systems, such as distributed systems and security protocols.
Title: Some Achievements of the International Joint Research Project "Formal Analysis and Verification of Post-quantum Cryptographic Protocols"
Abstract:
The international joint research project "Formal Analysis and Verification of Post-quantum Cryptographic Protocols" was carried out for April 2021 through March 2024. The main investigators are Santiago Escobar (Spain), Sedat Akleylek (Turkey), Ayoub Otmani (France) and me (Japan). Quantum era will be coming soon, when it is predicted that most of the currently used public-key cryptosystems become insecure because of the Shor's algorithm. Accordingly, cryptographers have been developing new cryptosystems that can replace the the currently used public-key cryptosystems and are resistant to the Shor's algorithm running on practical quantum computers that are expected to appear in the near future. Such new cryptosystems are called post-quantum cryptosystems, while the currently used public-key cryptosystems are called classical public-key cryptosystems. Some security protocols, such as TLS and SSH, have been revised such that post-quantum cryptosystems are used instead of classical public-key cryptosystems. The revised versions of TLS and SSH are called hybrid post-quantum TLS and hybrid post-quantum SSH because both classical public-key cryptosystems and post-quantum cryptosystems are used. In the international joint research project, some post-quantum cryptosystems, hybrid post-quantum TLS and hybrid post-quantum SSH have been formally analyzed. The formal analysis/verification of some post-quantum cryptosystems has been conducted with Maude, the one of hybrid post-quantum TLS has been conducted with Maude-NPA and CafeOBJ. and the one of hybrid post-quantum SSH has been conducted with CafeOBJ. I will talk about some achievements of the project.
Geguang Pu is a full professor of software engineering at East China Normal University. His research interests span the areas of software modeling, automated testing, and model checking. A common thread in Geguang's research is improving software reliability and trustworthiness by developing FM-based tools. Geguang joined East China Normal University in 2005 as an assistant professor and prior to that, he studied for Ph. D in Peking University. In July 2018, he was appointed as CEO of Shanghai Trusted Industrial Control Platform Co., Ltd for the technique transfer, where he is leading an effective engineering teams to develop the tool chains for software modeling, testing and verification, and these tools are used by more than 100 institutes/companies for structuring more reliable software systems.
Title: Developing the industrial-strength tools for modeling, testing and verification: A formal-methods perspective
Abstract:
FM-related techniques are very helpful to ensure the quality of software. For instance, the model checking technique has been successfully applied in hardware/software verification and it becomes the key element for EDA tool chains. In this talk, I will share the experiences of developing the industrial-strength tools for modeling, testing and verification from the formal methods perspective. We will show how to find the real problems about testing and verification from the industry and also show how the formal methods can guide to solve these problems by developing tools. We will illustrate our experiences and insights by three interesting tools under development. The first one is a formal modeling and verification tool for the formal verification of Interlock system of the train, that is key part of signal systems in railway. The second one is a testing tool for embedded systems, where the symbolic execution technique plays an important role. The last one is a new model checking solver for hardware verification, and its performance is tuned effectively by the new observations on the search process in the state space. These tools are successfully applied in our industry partners and their effectiveness is also proved by large scale examples. Last but not least, we will also share the lessons we have learned during the tool development.
Full Paper Submissions: 30 August, 2024
Acceptance / Rejection Notification: 7 October, 2024
Camera-ready Papers: 8 November, 2024
Submissions to the symposium must not have been published or be concurrently considered for publication elsewhere. Papers should be written in English and should not exceed 18 pages in the Springer LNCS format. All papers should be submitted using the EasyChair link: Here The proceedings of the symposium will be published in the Springer LNCS series. The details of the symposium can be found in the symposium homepage.
All the accepted papers for SFPVV 2024 will be recommended as submissions to the special issue titled “ Advancements in Formal Methods for System Development” in the journal of Complex Engineering Systems. All the submitted papers will go through the review process specified by the journal and the authors of all the accepted papers to the special issue will receive the following benefits:
1. Waiver for the article processing charges
2. Eligible for the journal’s Best Paper Award (First prize: $400; Second prize: $300)
Shaoying Liu, Hiroshima University, Japan
Yamine Ait Ameur, IRIT/INPT-ENSEEIHT, France
Yuting Chen, Shanghai Jiao Tong University, China
Yoonsik Cheon, University of Texas at El Paso, USA
Tadashi Dohi, Hiroshima University, Japan
Dingbang Fang, Fujian Normal University, China
Jiandong Li, Peking University, China
Jingyue Li, Norwegian University of Science and Technology, Norway
Ai Liu, Nanjing University of Aeronautics and Astronautics, China
Yang Liu, Nanyang Technological University, Singapore
Weikai Miao, ECNU, China
Fumiko Nagoya, Nihon University, Japan
Shin Nakajima, National Institute of Informatics, Japan
Hiroyuki Okamura, Hiroshima University, Japan
Yuji Sato, Hosei University, Japan
Xinfeng Shu, Xi’an University of Posts and Telecommunications, China
Pingyan Wang, Guangdong University of Petrochemical Technology, China
Xi Wang, Shanghai University, China
Guangquan Xu, Tianjin University, China
Zhen You, Jiangxi Normal University, China
Naijun Zhan, Chinese Academy of Sciences, China
Jianjun Zhao, Kyushu University, Japan