MVV 2012 - The 4th International Workshop on Model-Based Verification & Validation
Topics/Call fo Papers
The Costs entailed by software failures demonstrate that the systematic development of software in a certain quality is still a challenge, even after decades of research. One reason for this can certainly be found within the individual projects. Often, known techniques of quality assurance are not well understood and properly used due to deadline and budget restrictions. However, another reason is also the lack of techniques for quality assurance for specific types of software and software developed according to specific programming and modeling techniques.
Many ad-hoc security specifications, models, and protocols, which were implemented in software components in the past, turned out to be vulnerable to some extent. Formal verification and validation methods have the potential to increase user confidence in software artifacts. Therefore, theoretical foundations for security assurance should be investigated to discover new methods that will bring high certainty to the trustworthiness of software entities.
Verification and validation (V&V) methods deliver important analytical techniques for quality assurance. In model-based V&V, the software under consideration is analysed by means of a model that focuses on certain aspects, often on the behavior of the software. Models frequently used are finite state machines and flow graphs which are associated with such techniques as, for instance, formal verification, control and data flow analysis, test case generation, and model checking.
The successful 1st and 2nd MVV workshops hold in conjunction with SSIRI showed the tight links between the model based V&V and general issues of Secure Software Integration and Reliability Improvement and indicated great interest to the workshop themes among the conference participants. The 3rd MVV workshop will continue this fruitful collaboration between MVV and SSIRI, aiming at giving researchers and practitioners in the area a platform to present their results and experience to a broader audience.
Topics of interest
Topics include, but are not limited to:
* Formal methods and theories in model-based V&V
* Simulation by models, forecasts of behavior and properties by models
* Models and modeling notations for programming and V&V
* Tools for model-based V&V
* Model-based security evaluation
* V&V of security specifications, models, and protocols
* Theoretical foundations of security analysis and design
* Formal models for security testing
* Testing with software usage models
* Test case generation based on formal and semi-formal models
* Test coverage metrics and criteria for model-based testing
* Models as test oracles, test validation with models
* Application of model checking in testing
* Model-based V&V of reactive and object-oriented systems
* Model-based verification and validation of tests
* Experience reports and requirements from model-based V&V and model-based development in practice
Format and Proceedings
A one-day workshop held immediately before or during the main conference. Accepted submissions will be published by IEEE Press and available in the IEEE digital library. For the latter publication one of the authors will be required to register and to present the accepted submission. During the workshop, each paper will have a slot of 30 minutes, with 20-25 minutes presentation.
Many ad-hoc security specifications, models, and protocols, which were implemented in software components in the past, turned out to be vulnerable to some extent. Formal verification and validation methods have the potential to increase user confidence in software artifacts. Therefore, theoretical foundations for security assurance should be investigated to discover new methods that will bring high certainty to the trustworthiness of software entities.
Verification and validation (V&V) methods deliver important analytical techniques for quality assurance. In model-based V&V, the software under consideration is analysed by means of a model that focuses on certain aspects, often on the behavior of the software. Models frequently used are finite state machines and flow graphs which are associated with such techniques as, for instance, formal verification, control and data flow analysis, test case generation, and model checking.
The successful 1st and 2nd MVV workshops hold in conjunction with SSIRI showed the tight links between the model based V&V and general issues of Secure Software Integration and Reliability Improvement and indicated great interest to the workshop themes among the conference participants. The 3rd MVV workshop will continue this fruitful collaboration between MVV and SSIRI, aiming at giving researchers and practitioners in the area a platform to present their results and experience to a broader audience.
Topics of interest
Topics include, but are not limited to:
* Formal methods and theories in model-based V&V
* Simulation by models, forecasts of behavior and properties by models
* Models and modeling notations for programming and V&V
* Tools for model-based V&V
* Model-based security evaluation
* V&V of security specifications, models, and protocols
* Theoretical foundations of security analysis and design
* Formal models for security testing
* Testing with software usage models
* Test case generation based on formal and semi-formal models
* Test coverage metrics and criteria for model-based testing
* Models as test oracles, test validation with models
* Application of model checking in testing
* Model-based V&V of reactive and object-oriented systems
* Model-based verification and validation of tests
* Experience reports and requirements from model-based V&V and model-based development in practice
Format and Proceedings
A one-day workshop held immediately before or during the main conference. Accepted submissions will be published by IEEE Press and available in the IEEE digital library. For the latter publication one of the authors will be required to register and to present the accepted submission. During the workshop, each paper will have a slot of 30 minutes, with 20-25 minutes presentation.
Other CFPs
- Sixth International Conference on Sofware Security and Reliability SERE 2012
- The eighth annual IEEE International Conference on Automation Science and Engineering (CASE 2012)
- 2013 IEEE International Conference on Robotics and Automation (ICRA 2013
- Twenty-Fourth International Conference on Software Engineering and Knowledge Engineering (SEKE 2012)
- ACM SIGPLAN Seventh Workshop on Programming Languages and Analysis for Security (PLAS 2012)
Last modified: 2011-10-18 14:36:25