Conference Program

AEST - Australian Eastern Standard Time -

(GMT + 10 hours)

Meeting Room 102

SESSION CHAIRToby Murray

Meeting Room 102

SpeakerAnnabelle McIver

TITLE: Leakage Logic for programs

ABSTRACT: An information-flow analysis views a program as a system that processes "high security" secret information, e.g. passwords; but sometimes programs' treatment of secrets can be correlated to observed behaviour, or other data of "low security". Those programs then "leak" information when an adversary can infer something about the "high security" secret by using their knowledge of the program code, and observing real-time behaviours such as control flow, timings, or low- security correlations. In such programs verification usually entails quantifying the amount of information that the program leaks. Interestingly, some inputs are more vulnerable than others and an important goal of such formal analysis is to identify which inputs are most vulnerable.
In this talk I shall explain how to specify leakage bounds on programs that can be verified directly using a logic of information leakages. The leakage logic is based on the g-leakage framework for analysing quantitative security propeties; importantly verification steps are similar to the backwards reasoning in standard functional verification.

Session chair Toby Murray

10:30 AM - 11:00 AM

Meeting Room 102

25 min presentation + 5 minute discussion

11:00 AM

Goal Controller Synthesis for Self-Adaptive Systems

PRESENTER: Radu Calinescu

11:30 AM

Verifying Binary Neural Networks on Continuous Input Space using Star Reachability

PRESENTER: Mykhailo Ivashchenko (remote)

12:00 AM

Explainable Human-Machine Teaming using Model Checking and Interpretable Machine Learning

PRESENTER: Livia Lestingi

Session chairMark Utting

12:30 AM - 01:40 PM

Meeting Room 102

25 min presentation + 5 minute discussion

01:45 PM

Contract-Based Specification Refinement and Repair for Mission Planning

PRESENTER: Piergiuseppe Mallozzi (remote)

02:15 PM

Patch Specifications via Product Programs

PRESENTER: Cristian Cadar

02:45 PM

An Empirical Study Assessing Software Modeling in Alloy

PRESENTER: Bonita Sharif

Session chairLarissa Meinicke

03:15 PM - 03:45 PM

Meeting Room 102

25 min presentation + 5 minute discussion

03:45 PM

Mutant Equivalence as Monotonicity in Parametric Timed Games

PRESENTER: Maurice ter Beek

04:15 PM

Differential Testing of a Verification Framework for Compiler Optimizations (Case Study)

PRESENTER: Mark Utting

04:45 PM

Formalizing Symbolic Execution Path Explosion for Recursive Functions via Asymptotic Path Complexity

PRESENTER: Eli Pregerson, David Chen and Duy Lam (co-presenters)

Session chairCristian Cadar

06:00 PM - 09:00 PM

Meat Market, South Wharf

Meeting Room 102

SESSION CHAIRStefania Gnesi

Meeting Room 102

SpeakerPaola Spoletini

TITLE: Exploiting incompleteness in software development

ABSTRACT: System development is a dynamic and iterative process that involves refinements and revisions, often resulting in some components being only partially specified. To ensure that the system meets its requirements is essential to have the ability to perform continuous verification after each refinement or revision step. This calls for both models and verification techniques that can effectively handle incompleteness.
In this presentation, I will introduce incomplete models and model-checking techniques designed to address such models. Furthermore, I will show how these techniques can support other steps in the software development lifecycle, including requirements elicitation, design, and specification mining.

Session chairStefania Gnesi

10:30 AM - 11:00 AM

Meeting Room 102

25 min presentation + 5 minute discussion

11:00 AM

A Dafny-based approach to thread-local information flow analysis

PRESENTER: Graeme Smith

11:30 AM

Transparent Actor Model

PRESENTER: Marjan Sirjani (remote)

12:00 AM

Using cylindric algebra to support local variables in rely/guarantee concurrency

PRESENTER: Larissa Meinicke

Session chairDomenico Bianculli

12:30 AM - 01:40 PM

Meeting Room 102

25 min presentation + 5 minute discussion

01:45 PM

A Formal Approach to the Verification of Protection Systems in Low-Voltage Distribution Grids

PRESENTER: Ahmed Nagy Abdelkhalek Mansour

02:15 PM

A Verified UAV Flight Plan Generator

PRESENTER: Baptiste Pollien

Session chairGraeme Smith

Meeting Room 102

SESSION CHAIRTBA

03:15 PM - 03:45 PM