Submission Date


March 10th, 2014

April 1st, 2014

View details »


General Chairs


Véronique Cortier

Riadh Robbana

View details »


Invited Speaker



Mark Ryan


View details »


FMS Workshop



Overview

The 5th workshop on Formal Methods for Security will take place in Tunis, Tunisia on June, 23, 2014. It is co-located with the 35th International Conference on Application and Theory of Petri Nets and Concurrency (Petri nets 2014).

This is an overview of FMS previous editions:

  • The 4th edition of FMS was organized previously on August 4, 2010, in Tunisia Polytechnic School (TPS). The workshop last one day with 8 presentations. Speakers were from France, Canada and Tunisia, and there was about 50 participants. Program
  • The 3rd edition of FMS was organized as a satellite event of CAV 2009. FMS was then known as VETO. Website
  • The 2nd edition, VETO 2008, was held in Marseille, France. Program
  • The 1st edition, VETO 2007, took place at Tunisia Polytechnic School (TPS).

The 5th edition of FMS will take a full day and is scheduled to start with an invited talk followed by 3 sessions. The expected number of accepted papers is 8.

Scope

Systems and applications' security require formal proofs of correctness in order to achieve certification. Applications must be formally specified and proven to respect their specifications. The main scope of the workshop is to propose methods and techniques for constructing secure systems. We particularly welcome papers on techniques, tools and applications of formal methods (eg. timed automata, Petri nets, timed Petri nets, Process algebra, Logics...) for security.

The workshop will bring together academic and industry R&D researchers, in order to exchange ideas, discuss their research findings, and explore potential collaborations to provide solutions based on formal methods for developing secure systems and protocols.

Topics

We seek original research papers addressing issues in formal methods for security. We solicit contributions on the following (but not limited to) topics:

   Specification and verification of security issues (Automata, Petri nets, Process algebra, Logics, Equivalence checking...)

   Electronic voting

   Security and privacy

   Cryptographic protocols

   Hardware and embedded systems

   Probabilistic and real-time systems

   Tools for security protocols verification


Paper Submissions



Authors are invited to submit original contributions that were not previously published work, or currently under review by any other workshop or conference. All submissions should be written in English, and correspond to the standard LNCS format. Submitted papers should be in PDF format and should not exceed 15 pages.

Accepted papers will be published in of informal/electronic workshop proceedings (CEUR). Some of the best papers of the workshop will be invited for publication in the new subseries of Lecture Notes in Computer Science (LNCS) entitled "Transactions on Petri Nets and Other Models of Concurrency" (ToPNoC). The papers are expected to be minutely revised and they will go through a totally new round of reviewing.

Papers should be submitted using the following URL: https://www.easychair.org/conferences/?conf=fms2014

Important Dates

Paper Submission

March 10th , 2014

April 1st, 2014

Acceptance Notification

April 14th , 2014

April 30th, 2014

Camera-Ready

May 5th , 2014

Mai 12th, 2014

Workshop Date

June 23rd , 2014

ONE DAY


Committees



Invited Speaker

Mark Ryan
University of Birmingham, UK

General Information

Mark Ryan
Affiliation University of Birmingham, UK
Contact m.d.ryan@cs.bham.ac.uk
Homepage http://www.cs.bham.ac.uk/~mdr/
Research Topics Electronic voting
Verification of protocols
Verification of Pervasive Systems
Trusted computing
Access control systems

General Chairs

Véronique Cortier
LORIA, France

General Information

Véronique Cortier
Affiliation LORIA, France
Contact veronique.cortier@loria.fr
Homepage http://www.loria.fr/~cortier/
Research Topics Verification of security protocols
Electronic voting protocols
Link between symbolic and cryptographic models for protocols
Automatic deduction
Tree automata
Riadh Robbana
LIP2 & INSAT-University of Carthage

General Information

Riadh Robbana
Affiliation LIP2 & INSAT-University of Carthage, Tunisia
Contact riadh.robbana@gmail.com
Homepage https://sites.google.com/site/riadhrobbana/
Research Topics Formal Verification
Logics and automata
Computer security
Electronic Voting

Program Committee

Myrto Arapinis
University of Edinburgh, UK

General Information

Myrto Arapinis
Affiliation University of Edinburgh, UK
Contact marapini@inf.ed.ac.uk
Homepage http://www.inf.ed.ac.uk/people/staff/Myrto_Arapinis.html
Research Topics Verification of security properties
Detection of attacks
Formal models
Protocol composition
Automatic deduction
Process algebra
Kamel Barkaoui
Cedric-CNAM, France

General Information

Kamel Barkaoui
Affiliation Cedric-CNAM, France
Contact kamel.barkaoui@cnam.fr
Homepage http://cedric.cnam.fr/index.php/labo/membre/view?id=34
Research Topics Petri nets
Rewriting logic
Formal verification
Discrete event systems
Component-based distributed systems
Performance evaluation
Narjes Ben Rajeb
LIP2 & INSAT-University of Carthage, Tunisia

General Information

Narjes Ben Rajeb
Affiliation LIP2 & INSAT-University of Carthage, Tunisia
Contact narjes.benrajeb@gmail.com
Research Topics Formal Methods and Verification
Electronic Voting Protocols
Security Protocols
Vincent Cheval
University of Birmingham, UK

General Information

Vincent Cheval
Affiliation University of Birmingham, UK
Contact v.f.p.cheval@cs.bham.ac.uk
Homepage http://www.cs.bham.ac.uk/~chevavfp/
Research Topics Verification of Security Protocols
Automating verification of privacy type properties
Cloud computing security
Stephen Chong
Harvard University, USA

General Information

Stephen Chong
Affiliation Harvard University, USA
Contact chong@seas.harvard.edu
Homepage http://people.seas.harvard.edu/~chong/
Research Topics Language-based information security
Véronique Cortier
LORIA, France

General Information

Véronique Cortier
Affiliation LORIA, France
Contact veronique.cortier@loria.fr
Homepage http://www.loria.fr/~cortier/
Research Topics Verification of security protocols
Electronic voting protocols
Link between symbolic and cryptographic models for protocols
Automatic deduction
Tree automata
Stéphanie Delaune
CNRS-LSV, France

General Information

Stéphanie Delaune
Affiliation CNRS-LSV, France
Contact delaune@lsv.ens-cachan.fr
Homepage http://www.lsv.ens-cachan.fr/~delaune/
Research Topics Electronic Voting
Cryptographic protocols verification
Susanna Donatelli
University of Turin, Italy

General Information

Susanna Donatelli
Affiliation University of Turin, Italy
Contact susi@di.unito.it
Homepage http://www.di.unito.it/~susi/index.html
Research Topics Performance evaluation and probabilistic verification of discrete event systems based on stochastic Petri nets, high level Petri nets, and stochastic process algebras
Automatic generation of performance models from UML specifications
Sibylle Fröschle
OFFIS & University of Oldenburg, Germany

General Information

Sibylle Fröschle
Affiliation OFFIS & University of Oldenburg, Germany
Contact froeschle@informatik.uni-oldenburg.dex
Homepage https://vhome.offis.de/sibyllef/
Research Topics The interaction between security and safety
Analysis of security protocols and security APIs
Formal models
Behavioural equivalences
Logics
Verification of infinite-state systems
Pierre-Cyrille Héam
FEMTO-ST & INRIA-CNRS, France

General Information

Pierre-Cyrille Héam
Affiliation FEMTO-ST & INRIA-CNRS, France
Contact pheam@femto-st.fr
Homepage http://lifc.univ-fcomte.fr/~pcheam
http://members.femto-st.fr/pierre-cyrille-heam/
Research Topics Tree Automata
Services Composition
Security Protocols
Béchir Ktari
LAVAL University, Canada

General Information

Béchir Ktari
Affiliation LAVAL University, Canada
Contact bechir.ktari@ift.ulaval.ca
Homepage http://fsg-ftp.fsg.ulaval.ca/~ktari/
Research Topics Development of methods and practical tools, based on formal and theoretical aspects, for the analysis and certification of IT systems (programs, network traces, etc..) with respect to given properties.
Yassine Lakhnech
VERIMAG & University of Grenoble Alpes, France

General Information

Yassine Lakhnech
Affiliation VERIMAG & University of Grenoble Alpes, France
Contact yassine.lakhnech@imag.fr
Homepage http://www-verimag.imag.fr/~lakhnech/
Research Topics Theory in Computer Security and Cryptography
Computer-Verified Security
Computational Non-interference
Language-based Security
Semantics and foundations of programming and modeling languages
Semantics and Formal Verification
Logics and automata
Mahjoub Langar
LIP2 & ENIT-El Manar University, Tunisia

General Information

Mahjoub Langar
Affiliation LIP2 & ENIT-El Manar University, Tunisia
Contact mahjoub.langar@gmail.com
Research Topics Security policies
Concurrent programs
Mohamed Mejri
LAVAL University, Canada

General Information

Mohamed Mejri
Affiliation LAVAL University, Canada
Contact mohamed.mejri@ift.ulaval.ca
Homepage http://www2.ift.ulaval.ca/~mejri/
Research Topics Specification and analysis of cryptographic protocols and eCommerce
Risk analysis
Formal methods for specification and verification
Multi-paradigm languages
Aspect-oriented programming
Riadh Robbana
LIP2 & INSAT-University of Carthage, Tunisia

General Information

Riadh Robbana
Affiliation LIP2 & INSAT-University of Carthage, Tunisia
Contact riadh.robbana@gmail.com
Homepage https://sites.google.com/site/riadhrobbana/
Research Topics Formal Verification
Logics and automata
Computer security
Electronic Voting
Hassen Saidi
SRI International, USA

General Information

Hassen Saidi
Affiliation SRI International, USA
Contact saidi@csl.sri.com
Homepage http://www.sdl.sri.com/users/saidi/
Research Topics Computer-aided verification
Formal methods for the engineering of high-confidence systems
Formal methods for computer security
Intrusion detection
Static analysis
Mobile Security
Mobile forensics
Mobile application security
Malware analysis
Reverse engineering
Lilia Sfaxi
LIP2 & INSAT-University of Carthage, Tunisia

General Information

Lilia Sfaxi
Affiliation LIP2 & INSAT-University of Carthage, Tunisia
Contact liliasfaxi@gmail.com
Homepage http://liliasfaxi.wix.com/liliasfaxi
Research Topics Information flow control security (Non-Interference)
Component-based distributed systems
Robustness testing for security protocols
Constraint-aware MPSoC systems' scheduling
Jacques Traore
ORANGE Labs, France

General Information

Jacques Traore
Affiliation ORANGE Labs, France
Contact jacques.traore@orange.com
Homepage http://crypto.rd.francetelecom.com/people/Traoré
Research Topics Cryptographic protocols
Anonymity
eCash
Voting systems

Workshop Organizers

Imen Ben Hfaiedh
LIP2 & ISI-El Manar University, Tunisia

General Information

Imen Ben Hfaiedh
Affiliation LIP2 & ISI-El Manar University, Tunisia
eMail ben.hafaiedh.imen@gmail.com
Research Topics Contract-based design
Distributed systems
Component-based systems
Formal Model-based design
Mouhebeddine Berrima
LIP2 & ISSATS-University of Sousse, Tunisia

General Information

Mouhebeddine Berrima
Affiliation LIP2 & ISSATS-University of Sousse, Tunisia
Contact berrima.mouheb@gmail.com
Research Topics Electronic Voting
Security protocols
Bisimulation
Algebraic Observational Equivalence
Riadh Robbana
LIP2 & INSAT-University of Carthage, Tunisia

General Information

Riadh Robbana
Affiliation LIP2 & INSAT-University of Carthage, Tunisia
Contact riadh.robbana@gmail.com
Homepage https://sites.google.com/site/riadhrobbana/
Research Topics Formal Verification
Logics and automata
Computer security
Electronic Voting
Lilia Sfaxi
LIP2 & INSAT-University of Carthage, Tunisia

General Information

Lilia Sfaxi
Affiliation LIP2 & INSAT-University of Carthage, Tunisia
Contact liliasfaxi@gmail.com
Homepage http://liliasfaxi.wix.com/liliasfaxi
Research Topics Information flow control security (Non-Interference)
Component-based distributed systems
Robustness testing for security protocols
Constraint-aware MPSoC systems' scheduling
Sana Younes
LIP2 & FST-El Manar University, Tunisia

General Information

Sana Younes
Affiliation LIP2 & FST-El Manar University, Tunisia
Contact younessana@yahoo.fr
Research Topics Model checking for large Markov chains
Stochastic comparison applied to large Markov chains
Verification of hardware designs
Souheib Yousfi
LIP2 & INSAT-University of Carthage, Tunisia

General Information

Souheib Yousfi
Affiliation LIP2 & INSAT-University of Carthage, Tunisia
Contact souheib.youssfi@gmail.com
Research Topics Electronic voting
Modeling of cryptographic protocols
eAuction & ePassport
eGouvernment

Program




Registration and Accomodation



Please register for the FMS'14 workshop at the Petri Nets 2014 Registration site.
Information about how to reach the workshop / conference site and about hotels can be found at the Petri Nets 2014 Travel pages.