SERE 2014 Slide & Video

Photos Taken at SERE 2014

Keynote Speakers

June 30 (Monday)
  Adversarial Machine Learning
  by Doug Tygar, Professor
  Department of Computer Science
  University of California - Berkeley, USA [more...]

July 1 (Tuesday)
  Imagineering an Internet of Anything
  by Jeffrey Voas, Computer Scientist
  National Institute of Standards and Technology, USA
   [more...] [slides] [paper]

July 1 (Tuesday)
  Constraint-Based Reasoning in Static Analysis and

  by Jian Zhang, Professor & Assistant Director
  Institute of Software
  Chinese Academy of Sciences, China [more...] [slides]

July 2 (Wednesday)
  Software Fault Tolerance
  by Kishor Trivedi, Chair Professor
  Department of Electrical and Computer Engineering
  Duke University, USA [more...] [slides]

Welcome to SERE 2014 -- The 8th International Conference on Software Security and Reliability, sponsored by the IEEE Reliability Society, which is to be held in the San Francisco Bay Area from June 30 to July 2, 2014.

SERE 2014 brings together a broad spectrum of both researchers and practitioners who present on-going ideas, experiences, and most recent research. They can exchange their best practices for developing reliable, secure, and trustworthy software systems more effectively and efficiently. This gives the academic community an increased awareness of areas vital to the industry, while also presenting practitioners an opportunity to express their needs.

The conference has three major tracks: research papers, fast abstracts and the student doctoral program. Included are invited keynote addresses, talks, panels, and tutorials on emerging topics related to the scope of the conference. Additional workshops, more intensely focused, will also be held concurrently.

With its increasing use in many large, complicated systems such as in transportation, medicine, finance, and nuclear power generation, software has become an absolute factor in our everyday lives. Assuring the secure and reliable operation of these systems is of the highest priority, since a failure of such systems can lead to a significant financial loss or even human casualties. In response to this emerging trend, SERE 2014 has a special theme on

Software Quality Assurance

Special welcome is extended to contributions on the following topics, although others will be accepted as well:

  Security, Reliability, Availability, and Safety of Software Systems
  Information and Software Assurance
  Fault Tolerance for Software Reliability Improvement
  Modeling, Prediction, Simulation, and Evaluation
  Validation, Verification, and Testing
  Metrics, Measurements, and Analysis
  Secure and Reliable Storage
  Software Penetration and Protection
  Software Vulnerabilities
  Malware Detection and Analysis
  Intrusion Detection and Prevention
  Operating System Security and Reliability
  Mobile and Cloud Computing
  Theory and Practice
  Benchmark and Empirical Studies

Organizing Committee

General Chair Bret Michael Navy Postgraduate School USA
Program Chair Wen-Guey Tzeng National Chiao Tung University Taiwan
Workshop Chair Rui Maranhao University of Porto Portugal
Student Doctoral Program Chair Raul Santelices Notre Dame University USA
Publicity Chair Sudipto Ghosh Colorado State University USA
Publication Chair Yu-Lun Huang National Chiao Tung University Taiwan
Finance Chair Eric Wong University of Texas at Dallas USA
Registration Chair Junhua Ding East Carolina University USA
Webmaster Shou-Yu Lee University of Texas at Dallas USA

Steering Committee

W. Eric Wong (co-Chair) University of Texas at Dallas USA
Sam Keene (co-Chair) IEEE Reliability Society USA
Jeffrey Voas NIST USA
Fevzi Belli University of Paderborn Germany
Karama Kanoun LAAS-CNRS France
Raymond Paul Department of Defense USA
Shiuhpyng Winston Shieh National Chiao Tung University Taiwan
Ji Wang National University of Defense Technology China

Program Committee

Doo-Hwan Bae Korea Advanced Institute of Science and Technology Korea
Ebrahim Bagheri Ryerson University Canada
Jongmoon Baik Korea Advanced Institute of Science and Technology Korea
Elisa Bertino Purdue University USA
Brahim Hamid University of Toulouse France
W.K. Chan City University of Hong Kong Hong Kong
Morris Chang Iowa State University USA
Hao Chen University of California, Davis USA
Ke-Fei Chen Shanghai Jiaotong University China
Vidroha Debroy Hudson Alley Software USA
Ewen Denney SGT/NASA Ames USA
Wei Dong National University of Defense Technology China
Xinshu Dong National University of Singapore Singapore
Mahmoud Elish King Fahd University of Petroleum and Minerals Saudi Arabia
Fu-Hau Hsu National Central University Taiwan
Chin-Tser Huang University of South Carolina USA
Yu Lun Huang National Central University Taiwan
Shih-Kun Huang National Chiao Tung University Taiwan
Chin-Yu Huang National Tsing Hua University Taiwan
Ling Huang UC Berkeley USA
Lucas Chi Kwong Hui University of Hong Kong Hong Kong
Martin Gilje Jaatun SINTEF ICT Norway
Herbert Kuchen University of Muenster Germany
Luiz Laranjeira Universidade de Brasilia Brasilia
Xuandong Li Nanjing University China
Ninghui Li Purdue University USA
Zhiwei Li UC Berkeley USA
Shundong Li Shaanxi Normal University China
Horst Lichter RWTH Aachen University Germany
Lin Liu Tsinghua University China
Peng Liu Pennsylvania State University USA
Jose Maldonado University of Sao Paulo Brazil
Rivalino Matias Jr. Federal University of Uberlandia Brazil
Eliane Martins Unicamp Brazil
Bruce Mcmillin Missouri University of Science and Technology USA
Yi Mu University of Wollongong Australia
Cu D. Nguyen University of Luxembourg Luxembourg
Thomas Noll RWTH Aachen University Germany
Phu Phung University of Gothenburg Sweden
Pierangela Samarati University degli Studi di Milano Italy
Raul Santelices Notre Dame University USA
Sahra Sedigh Missouri University of Science and Technology USA
Chii-Ren Tsai Citigroup Inc. USA
Tugkan Tuglular Izmir Institute of Technology Turkey
Komminist Weldemariam IBM Africa Kenya
Duncan S. Wong City University of Hong Kong Hong Kong
Yu-Sung Wu National Chiao Tung University Taiwan
Dianxiang Xu Dakota State University USA
Chang Xu Nanjing University China
Chung-Huang Yang National Kaohsiung Normal University Taiwan
Yuen Tak Yu City University of Hong Kong Hong Kong
Yuliang Zheng University of North Carolina USA
Mohammad Zulkernine Queen's University Canada

Information for authors of regular papers

Submit original papers (not published or submitted elsewhere) with a maximum of ten pages. Include the title of the paper, the name and affiliation of each author, a 150-word abstract, and up to 6 keywords. The format of your submission must follow the IEEE conference proceedings format.

  Click here to submit your paper.

Information for authors of fast abstracts

The objective of fast abstracts is to report on-going work, describe practical experiences, introduce new ideas to promote further validation, or state positions on controversial issues. Each fast abstract can have a maximum of two pages using the IEEE conference proceedings format.

Click here to submit your fast abstract.

Information for authors of student doctoral program

The objective of the Student Doctoral Program is to encourage students to attend SERE and present their work, exchange ideas with researchers and practitioners, and get early feedback on their research efforts. Submit original papers (not published or submitted elsewhere) with a maximum of six pages using the IEEE conference proceedings format. Each submission should include the title of the paper, the name and affiliation of each author, a 150-word abstract, and up to 6 keywords. The first author must be a student (the advisor or non-student collaborators may be co-authors). Once accepted the paper should be presented by a student.

  Click here to submit your paper.

Information for authors of workshops

Submit original papers (not published or submitted elsewhere) with a maximum of ten pages. Include the title of the paper, the name and affiliation of each author, a 150-word abstract, and up to 6 keywords. The format of your submission must follow the IEEE conference proceedings format.

  Click on "Workshops" on the left pane to view all the co-located workshops.

Conference Proceedings

The conference proceedings will be published by IEEE Computer Society Conference Publishing Services (CPS). Papers presented at the conference will also be submitted for inclusion into the IEEE Xplore and to all of the A&I (abstracting and indexing) partners (such as the EI Compendex).

Special Section of IEEE Transactions on Reliability

Authors of selected best papers from the conference will be invited to submit an extended version to a special section of IEEE Transactions on Reliability (T-Rel).

Important Dates

    November 15, 2013       Workshop proposals due
    February 3, 2014
      Regular papers due
    February 27, 2014
      Fast Abstract Track due
    February 27, 2014
      Student Doctoral Program due
    March 20, 2014       Author notification
    April 25, 2014 (extended)       Camera-ready and author registration due
    June 30-July 2, 2014       Conference dates

Public Transportation

Railway Station
  • Ralston (4.00 KM/2.50 MI)
  • San Carlos (4.00 KM/2.50 MI)

  • San Francisco International (16.09 KM/10.00 MI) - Free shuttle available
  • San Jose International (40.23 KM/25.00 MI)
  • Oakland International (48.28 KM/30.00 MI)

  • San Carlos (3.20 KM/2.00 MI)

Highway Exit
  • Holly Street (3.00 KM/1.88 MI)
  • Ralston Avenue (3.00 KM/1.88 MI)

Shuttle Service

  • Pick-up/drop-off from San Francisco International Airport only.
  • Call Hotel at (650) 598-9000 to request airport shuttle pick-up after collecting your luggage from the baggage claim.
  • Hours of operations are 6:00AM to 11:00PM daily.
  • Approximate 30-35 minutes for pick-up/drop-off depending on traffic.

How to get to the Shuttle Area

  • From the baggage claim area, go up to the departure level.
  • Cross the street to the center island where you will see "Hotel Courtesy Shuttle Only".

Designated Pick-Up Points

  • Terminal 1: All Domestic Airlines (Airtran, US Airways, Delta, Frontier, Alaska)
    Exit through US Airways
  • International Terminal: All International Airlines (Jet Blue, KLM, China, Air Canada, British Airways, Swiss Airways, Lufthansa, etc.)
    Exit through Air France
  • Terminal 2: Virgin American, American Airlines
  • Terminal 3: Continental/United
    Exit through United Gate # 8


Arriving by Vehicle

From the South

Take highway 101 north. Exit from Holly Street, then follow signs for Redwood Shores Parkway. At the second traffic light turn left onto Twin Dolphin Drive. The hotel is half a mile down on the right hand side.

From the North

Take highway 1011 south. Exit from Ralston, then follow signs for Marine Parkway. At the third traffic light, turn right onto Twin Dolphin Drive. The hotel is half a mile down on the left hand side.


Previous Conferences

  SERE 2013 - Washington, D.C., USA
  SERE 2012 - Washington, D.C., USA
  SSIRI 2011 - Jeju Island, Korea
  SSIRI 2010 - Singapore
  SSIRI 2009 - Shanghai, China
  SSIRI 2008 - Yokohama, Japan

SERE 2014 co-Located Workshops

All the workshops will be held concurrently with the main conference.

  SEESED: International Workshop on Secure Software Development
      Natarajan Meghanathan (Jackson State University, USA)

      Click here to submit your papers to SEESED 2014

  SSCPS: International Workshop on Safety and Security in
      Cyber-Physical Systems
      Yunwei Dong (Northwestern Polytechnical University, China)

      Click here to submit your papers to SSCPS 2014

  IA: International Workshop on Information Assurance
      Shih-Kun Huang (National Chiao Tung University, Taiwan)

      Click here to submit your papers to IA 2014

  TC: International Workshop on Trustworthy Computing
      Fu-Hau Hsu (National Central University, Taiwan)
      Yu-Sung Wu (National Chiao Tung University, Taiwan)

      Click here to submit your papers to TC 2014

  HSCD: International Workshop on Hardware-Software Co-Deisgn
      Donghui Guo (Xiamen University, China)
      Click here to submit your papers to HSCD 2014

For any inquiry, please contact

Best Paper Award

At least one award will be presented by SERE 2014. Authors will receive a plaque signed by the President of the IEEE Reliability Society and also a cash prize (depending on the conference budget).

SSIRI 2011: Keynote Speakers

Gerard J Holzmann
Jet Propulsion Laboratory, NASA

Verifying Complex Software Systems: the Challenge


Virtually all software applications grow in size and complexity over time.For software used in spacecraft, software size can even be shown to grow exponentially with each new mission flown, matching the growth trends seen in many other industries. This rapid growth poses a serious challenge to our ability to verify the reliability of complex safety-critical software systems. Significant progress has been made in the development of strong tool-based formal verification techniques in the last few decades, but the bar keeps rising. I will describe how we are tackling this challenge, and where the main research challenges in reliable systems design currently are.


Gerard Holzmann received his Ph.D. from Delft University of Technology in 1979. From 1980 until 2003 he was a researcher in the Computing Science Research Center of Bell Laboratories, in Murray Hill, New Jersey. He then moved to NASA/JPL in California to start the new Laboratory for Reliable Software, where he is currently a senior research scientist. He has published four books and many technical articles on software verification methods, image processing techniques, and telecommunication history. Dr. Holzmann is a member of the U.S. National Academy of Engineering. url:

C.V. Ramamoorthy
Department of Electrical Engineering and Computer Sciences
UC Berkeley, USA

Software Engineering Approaches to the Challenges in Technology Education and System Development in the Software Ecosystem Environment


There exist several challenges in the current science, engineering, mathematics (STEM) graduate education. We are continuously inundated with great volumes of information from our portable communication devices, lap tops, television etc., continuously. We do multitasking to assimilate the information resulting developing short attention spans. Our current digital generation spends enormous amount of time on social networking, video entertainment and video games. Science and engineering subjects require long and deep attention spans to learn and to contribute. We discuss some of the successful methods that can help us to focus on the deep engineering and technology. These include video narratives, entertainment and gaming. We consider the instructional methods developed by ancient Greeks (Aristotle, Socrates etc.), and the teaching of moral principles by means of parables and narratives by Buddha and Christ. We consider the successful interest and curiosity creating violin teaching methods of Suzuki. We study the talent discovering and skill enhancing instructional methods of Montessori. The social networking and interactive type of instruction was used by Escalante to overcome academic weaknesses. The tweet- and- repeat methods of the Khan Academy also provide useful ideas for improving our teaching process using ICT technology. We propose a comprehensive cocktail (mixture) of methods as the transformative means to upgrade of STEM higher education based on similar ideas proposed and successfully used by Norman Borlaug, the Nobel Prize-winning agricultural biologist in agricultural crop production. His methods eliminated the unfortunate annual food famines in Mexico, China, and India. We propose a comprehensive software supported methods using graphical animation, using virtualization, immersion and video gaming techniques to capture interest and enhance creative skills. It is well known that we use only a small fraction of the total visual and sensual bandwidth that our nervous system and brain can process at any instant. We can expand our educational communication bandwidth input by innovative interactive graphical and aural presentations of our academic material for maximum advantage to create both interest, learning and to develop creative skills.

We introduce the theme of 'Needs Engineering' into our technical educational curriculum. This topic emphasizes the importance of problem (needs) finding, problem discovery and problem anticipation. We associate a 'problem' with a specific need. Needs and necessities are mothers of invention and innovation and therefore the prime factors in creative thinking. We describe the classification of problem-solution pairs using the Remsfeld paradigm of knowns-unknowns and their importance in creative problem finding and solving. Our educational system emphasizes problem solving under a known and well understood framework of theory and knowledge. It does not lead to creative thinking beyond the 'box'. It has been said that 'main object of teaching is not just how to solve problems and give explanations, but to knock at the doors of the mind'. Problems and needs- finding approaches are indeed the mothers of creative innovation. We quote a well known ICT company CEO:

"Today it is the minds, not the megahertz or the gigabytes that are scarce. Use IT (information technology) to enhance them and use them to deliver sustainable and survivable products to support our developing world".

In the second part of the presentation, we shall concentrate on software ecosystems and the sustainability issues of software entities. We see a large proliferation of platforms, app's, operating systems, designs, patterns etc. The concept of software ecosystem tries to develop an environment which nurtures, supports and evolves sustainable software systems. As in the natural ecosystem sustainability implies survivability in the short term and evolution and growth in the long term under changing environments, such as operating systems, languages, platforms, services etc. We develop a simple model of growth and give some examples. The theory involves the three basic resources, namely, intellectual resource (I), manual resources (M), and physical (P) resources, essential for our living. Intellectual resources grow in accordance with the law of increasing returns (Arthur and Romer); the manual resources follow the Churchill's suggestion of using minimum manual effort, and the natural physical resources follow the law of diminishing returns. We show that the basic tenets of our growth theory are similar to theory of evolution of human development. It is not a perfect theory. We are still working on it. It is just an hypothesis and yet provides another abstract way to look at evolution and provides some valuable insights on the software engineering trends of the future.

Mike Hinchey
Lero-the Irish Software Engineering Research Centre, Ireland

Evolving Critical Systems


Increasingly software can be considered to be critical, due to the business or other functionality which it supports. Upgrades or changes to such software are expensive and risky, primarily because the software has not been designed and built for ease of change. Expertise, tools and methodologies which support the design and implementation of software systems that evolve without risk (of failure or loss of quality) are essential. We address a research agenda for building software that (a) is highly reliable and (b) retains this reliability as it evolves, either over time or at run-time. We propose Evolving Critical Systems as an area for research to tackle the challenge and outline a number of scenarios to highlight some of the important research questions that should be asked of the community. Given that software evolution can be seen as a compromise between cost and risk, the most pressing question to ask is which processes, techniques and tools are most cost-effective for evolving critical systems?


Mike Hinchey is scientific director of Lero-the Irish Software Engineering Research Centre and a professor of software engineering at the University of Limerick, Ireland. His research interests include selfmanaging software and formal methods for system development. Hinchey received a PhD in computer science from the University of Cambridge. He is a senior member of the IEEE and currently chairs the IFIP Technical Assembly. url:

Registration (The deadline for author registration is April 25, 2014)

  Please read all the details on this page before click here to start your registration.

  Registration Fee

Early Registration
(until April 25)
Late Registration
(April 26 - June 28)
IEEE Member USD 600 USD 700 USD 800
IEEE non-Member USD 700 USD 800 USD 900
IEEE Student Member USD 400 USD 450 USD 500
Non-IEEE Student Member USD 450 USD 500 USD 550

  Registration Policy

  • The registration fee must be paid in full with a credit card when registering for the conference.

  • Every paper (including those in the Student Doctoral Program, Workshops, and Fast Abstract Track) must have at least one paid non-student registration, (i.e., the student registration is not sufficient) in order to be included in the conference proceedings or the SERE 2014 companion.

  • Each registration covers all the technical sessions at the main conference and workshops, as well as meals and social events such as lunches, coffee breaks, banquet, etc.

  • Student registration only applies to full-time students. Proper IDs must be presented at the conference. It cannot be used to satisfy the registration requirement for the paper to be included in the proceedings or companion.

  Refund Policy

  • Cancellation by May 20th, 2014: Full refund less a $50 USD administrative fee.

  • Cancellation after May 20th, 2014: No refund. However, you may substitute another person for your registration at any time. Contact Professor Eric Wong in the event you want to make a substitution.

  Paper Presentation

  • Every paper must be presented by one of the authors at the conference in order to be included in the IEEE digital library and indexed by the EI Compendex. This requirement cannot be satisfied by a guest presenter who is not a co-author of the paper, nor by a video presentation without an in-person appearance; such papers will not be eligible for the digital library or the indexing service. Contact Program Chair Professor Wen-Guey Tzeng with sufficient justification in the event of extraordinary circumstances that would make attendance impossible.

SERE 2014 Meeting Venue & Hotel

Sofitel San Francisco Bay Hotel

223 Twin Dolphin Dr, Redwood City, CA 94065
Phone: (650) 598-9000
Fax:     (650) 598-9383


  • Click HERE for hotel reservation.

  • A limited number of rooms are available from June 29 to July 2 with a group discount rate of $139.00 USD plus tax. Please make your reservation as soon as possible.

All participants staying at the hotel must use the above customized link to reserve a room. This will identify you as a SERE 2014 attendee. The hotel requires a credit card number to secure the room and to cover incidental expenses.

Final Camera-ready Submission

Please follow the instructions in the author kit you received from Bob Warner at the IEEE CPS (Conference Publishing Services) to upload your camera-ready version directly to the specific IEEE web server. Do not submit it via EasyChair, which was only for the initial submission.

  Number of Pages

    Regular Paper: 10
    Student Paper: 6
    Fast Abstract: 2
    Workshop: 10

     No extra pages are allowed.

  The submission deadline is April 30, 2012.
    If you have more than one paper accepted, you need to create one profile for each

    After the submission, you also need to submit the copyright release to the IEEE.

SERE 2014: Keynote Speakers

Stephen S. Yau
Information Assurance Center, and School of Computing, Informatics, and Decision Systems Engineering,
Arizona State University
Tempe, Arizona, USA

Human Factors in Development of Trustworthy Service-based Systems


Over the past decade, the rapid advances and growth in deployment of service-based systems, such as the booming cloud computing systems, have had major impacts on the economy, society, and our daily lives. Today, users have grown more accustomed to accessing various online services from a wide range of computing devices, from smart phones/tablets to desktop PCs, for both business and entertainments. However, such a trend also means that more users' private and confidential information than ever is transferred processed and stored in service-based systems. This trend raises serious concerns on the trustworthiness of such systems. Substantial research has been devoted to developing new security mechanisms, network protocols, and methods to improve the trustworthiness of service-based systems. Human factors, however, have not been sufficiently addressed in the development of trustworthy service-based systems.

Human factors encompass many aspects in the development of trustworthy service-based systems, from design of trust management for trustworthy service-based systems and analysis of tradeoff between system usability and security to the evaluation of users' confidence and the usability of the deployed systems. Human factors are more important in the development of trustworthy service-based systems than traditional software systems due to more complicated interactions among various participants (infrastructure providers, service providers, application developers, and users) of service-based systems.

In this address, the current state of the art of human factors considered in the development of trustworthy service-based systems will be discussed, especially on how human factors are incorporated in improving system trustworthiness, such as the establishment and evaluation of trusts. Challenges and future research directions for human factors in the development of trustworthy service-based systems will be presented.


Stephen S, Yau is the director of Information Assurance Center and a professor of computer science and engineering at Arizona State University (ASU), Tempe, Arizona, USA. He served as the chair of the Department of Computer Science and Engineering at ASU in 1994-2001. Previously, he was on the faculties of Northwestern University, Evanston, Illinois, and University of Florida, Gainesville.

He served as the president of the Computer Society of the Institute of Electrical and Electronics Engineers (IEEE) and was on the IEEE Board of Directors, and the Board of Directors of Computing Research Association. He served as the editor-in-chief of IEEE COMPUTER. He organized many national and international major conferences, including the 1989 World Computer Congress sponsored by International Federation for Information Processing (IFIP), and the Annual International Computer Software and Applications Conference (COMPSAC) sponsored by the IEEE Computer Society. His current research includes service-based systems, cloud computing, trustworthy computing, software engineering, mobile ad hoc networks and ubiquitous computing. He has received many awards and recognitions for his accomplishments, including the Tsutomu Kanai Award and Richard E. Merwin Award of the IEEE Computer Society, the IEEE Centennial Award and Third Millennium Medal, the Outstanding Contributions Award of the Chinese Computer Federation, and the Louis E. Levy Medal of the Franklin Institute. He is a Fellow of the IEEE and the American Association for the Advancement of Science. He received the M.S. and Ph.D. degrees from the University of Illinois, Urbana, and the B.S. degree from National Taiwan University, Taipei, all in electrical engineering.

Virgil Gligor
Department of Electrical and Computer Engineering
Carnegie Mellon University, USA

Towards a Theory of Trust in Networks of Humans and Computers


We argue that a general theory of trust in networks of humans and computers must be build on both a theory of behavioral trust and a theory of computational trust. This argument is motivated by increased participation of people in social networking, crowdsourcing, human computation, and socio-economic protocols, e.g., protocols modeled by trust and gift-exchange games, norms-establishing contracts, and scams/deception. User participation in these protocols relies primarily on trust, since online verification of protocol compliance is often impractical; e.g., verification can lead to undecidable problems, co-NP complete test procedures, and user inconvenience. Trust is captured by participant preferences (i.e., risk and betrayal aversion) and beliefs in the trustworthiness of other protocol participants. Both preferences and beliefs can be enhanced whenever protocol non-compliance leads to punishment of untrustworthy participants; i.e., it seems natural that betrayal aversion can be decreased and belief in trustworthiness increased by properly defined punishment. We argue that a general theory of trust should focus on the establishment of new trust relations where none were possible before. This focus would help create new economic opportunities by increasing the pool of usable services, removing cooperation barriers among users, and at the very least, taking advantage of "network effects." Hence a new theory of trust would also help focus security research in areas that promote trust-enhancement infrastructures in human and computer networks. Finally, we argue that a general theory of trust should mirror, to the largest possible extent, human expectations and mental models of trust without relying on false metaphors and analogies with the physical world.

This talk is based on joint work with Jeannette Wing.


Virgil D. Gligor received his B.Sc., M.Sc., and Ph.D. degrees from the University of California at Berkeley. He taught at the University of Maryland between 1976 and 2007, and is currently a Professor of Electrical and Computer Engineering at Carnegie Mellon University and co-Director of CyLab. Over the past thirty-five years, his research interests ranged from access control mechanisms, penetration analysis, and denial-of-service protection to cryptographic protocols and applied cryptography. Gligor was an editorial board member of several IEEE and ACM journals, and the Editor in Chief of the IEEE Transactions on Dependable and Secure Computing. He received the 2006 National Information Systems Security Award jointly given by NIST and NSA in the US, and the 2011 Outstanding Innovation Award given by the ACM Special Interest Group on Security, Audit and Control.

Huimin Lin
State Key Laboratory of Computer Science, Institute of Software,
Chinese Academy of Sciences, China

Checking Safety Properties of Concurrent Programs


As network and multi-core systems are becoming pervasive, software systems also go concurrent. In a concurrent setting, in order to accomplish its computation task a program must cooperate with other programs by exchanging messages between them. These result in non-determinism and sophisticated interaction behaviour, making it very difficult to ensure that concurrent software systems will run safely and reliably

In this talk I will present an approach to checking safety properties of concurrent programs. In this approach, concurrent programs are represented as symbolic transition graphs which can be regarded as a generalization of flow chart diagrams to allow nondeterminism and communication. Safety properties are expressed as formulas in alteration-free first-order mu-calculus. An efficient algorithm exists to check whether a symbolic transition graph satisfies the desired properties. Various abstraction techniques can be incorporated to reduce the size of reachable state space.


Huimin Lin received Ph.D in Computer Science from the Institute of Software, Chinese Academy of Sciences, in 1986. He is currently a research professor and the director of the State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences. He was elected Member of Chinese Academy of Sciences in 1999.

Prof. Lin's research interests include concurrency, model checking, modal logics, formal methods, and tools and algorithms for concurrent systems. He is in the editorial boards of Information and Computation, Theoretical Computer Science, as well as major computer science journals in China (Science in China, Journal of Computer, Journal of Software, Journal of Computer Science and Technology etc.). He serves in the Steering Committees of the International Conference on Quality Software and the Asia-Pacific Software Engineering Conference, and has been general chairs or program committee chairs of several international conferences in the area of computer science and software.

SERE 2014: Additional Invited Speakers

Karama Kanoun
Directeur de Recherche
Toulouse, France

Software Dependability Assessment: A Reality or A Dream


The widespread use of software systems and their ever increasing size and complexity induce many challenges to software developers and quality assurance practitioners. A fully integrated approach, based on qualitative and quantitative aspects, is needed to ensure that software dependability is correctly handled and the expected goals are reached for the final product. Dependability assessment, based on measurement, plays a vital role in software dependability improvement.

Measurement encompasses both the observation of the software behavior during its development or operational life (i.e., field measurement) and controlled experimentation (i.e., experimental measurement). Field measurement requires the collection of data related to failures, maintenance, and usage environment, in order to evaluate measures such the overall software failure rate, the failure rates according to some specific (critical) failure modes, the components failure rates, and system availability. Controlled experimentation complements very well field measurement, particularly when considering Off-The-Shelf software for which, most of the time, no information is available from the development phase.

The presentation will focus on dependability assessment, based on measurements. It will i) outline current approaches to measurement-based dependability assessment, with examples from real-life systems, and ii) identify some research gaps.


Karama Kanoun is Directeur de Recherche at LAAS-CNRS (French National Centre for Scientific Research - Laboratory for Analysis and Architecture of Systems), in charge of the Dependable Computing and Fault Tolerance Research Group ( Her research interests include modeling and evaluation of computer system dependability considering hardware as well as software, and dependability benchmarking. She has co-directed the production of a book on Dependability Benchmarking (Wiley and IEEE Computer Society, 2008).

Karama Kanoun is Chairperson of the Special Interest Group on Dependability Benchmarking of the International Federation for Information Processing (IFIP), and vice-chairperson of the IFIP working group 10.4 on Dependable Computing and Fault Tolerance. She was the principal investigator of the DBench European project (Dependability Benchmarking), and managed the European Network of Excellence ReSIST, Resilience Survivability in IST.

She is chairing the Steering Committee of the European Dependable Computing Conference (EDCC) and serving on the Steering Committees of three other conferences in her field of interest: DSN (the IEEE/IFIP International Conference on Dependable Systems and Networks), ISSRE (the IEEE International Symposium on Software Reliability Engineering), and SERE (the IEEE International Conference on Software Security and Reliability). She has been a consultant for several French companies (including Renault-Automation, SYSECA, Aerospatiale, SAGEM, CNES, Alcatel Espace, STNA), the European Space Agency, Ansaldo Transporti, and the International Union of Telecommunications.

Phillip Laplante
IEEE Fellow &
Professor of Software Engineering

Penn State University

Safe and Secure Software Systems and the Role Professional Licensure


Licensure of certain software engineers in the United States will be required in at least 10 states by 2013 and, likely, by all US states and jurisdictions within a few years. States license engineers to ensure that those who offer services directly to the public are minimally competent. But what kinds of software systems affect the health, safety and welfare of the public? Which software engineers will need to be licensed? The answers to these two questions are both a matter of law and of science. This paper introduces some of the scientific aspects of these two questions from the perspective of reliability engineering and suggests new research directions to help answer these questions.


Dr. Phillip Laplante is Professor of Software Engineering at Penn State's Great Valley Graduate Professional Center. In addition to his academic career, Dr. Laplante spent several years as a software engineer and project manager working on avionics, computer aided design and software test systems. He has authored or edited 27 books and has published more than 200 scholarly papers. He is currently chairing the committee that is developing the examination, which will be used nation-wide to license Professional Engineers in the practice of Software Engineering.

Laplante received his B.S., M.Eng., and Ph.D. in Systems Planning & Management, Electrical Engineering, and Computer Science, respectively, from Stevens Institute of Technology and an MBA from the University of Colorado. He is a Fellow of the IEEE and SPIE and a member of numerous other professional societies, program committees, and boards. He is a licensed professional engineer in Pennsylvania and a Certified Software Development Professional.

Ji Wang
National Laboratory for Parallel and Distributed Processing,
School of Computer, National University of Defense Technology,
Changsha, China

Formal Modeling, Verification and Refinement of Long Running Transactions


Recently, long running transactions attracted much research attention, because they are adopted in distributed systems, such as service-oriented systems, to ensure consistency. How to model and verify long running transactions is critical to improve the reliability of current distributed systems.

This talk will introduce our recent work on formal modeling, verification and refinement of long running transactions in terms of a process algebra language. The start point of our work is Compensating CSP (cCSP), which extends CSP for specification and verification of long running transactions. We present an extended cCSP to support the modeling of non-determinism, deadlock and livelock, which are the three basic features of concurrent systems. A full semantic theory supporting refinement for the extended language is developed based on the theory of CSP. Leveraged by our semantic theory, the verification techniques and the tools, such as FDR and PAT, can be extended for verifying long running transactions.

This talk is based on joint work with Zhenbang Chen and Zhiming Liu.


Ji Wang received his B.S., M.S. and Ph.D. in Computer Science from National University of Defense Technology. He is currently a professor in School of Computer of National University of Defense Technology, and the deputy director of National Laboratory for Parallel and Distributed Processing of China. He has been awarded National Natural Science Fund for Distinguished Young Scholars of China, and Professorship of Chang Jiang Scholars Program of Ministry of Education of China. His research interest includes formal analysis and verification of software systems, and distributed parallel computing. He has been an editorial board member of the Journal of Systems and Software, the Science China (Information Sciences), and a member of the Steering Committee of the International Conference on Software Security and Reliability.