Slides of the SEFM17 talks are collected in this page.

  • Marsha Chechik (University of Toronto, Canada)

Software Safety and Security, Assurance Cases and Model Management

    • Jonatan Wiik and Pontus Boström

Specification and Automated Verification of Dynamic Dataflow Networks

    • Laura Bozzelli, Alberto Molinari, Angelo Montanari and Adriano Peron

An in-Depth Investigation of Interval Temporal Logic Model Checking with Regular Expressions

    • Giordano Pola, Elena De Santis and Maria Domenica Di Benedetto

On Approximate Diagnosability of Metric Systems

    • Anna Bernasconi, Claudio Menghi, Paola Spoletini, Lenore Zuck and Carlo Ghezzi

From model checking to a temporal proof for partial models

    • Alessandro Fantechi, Anne E. Haxthausen and Hugo Daniel Macedo

Compositional Verification of Interlocking Systems for Large Stations

    • Steffen Märcker, Christel Baier, Joachim Klein and Sascha Klüppelholz

Computing Conditional Probabilities: Implementation and Evaluation

    • Gianpiero Cabodi, Paolo Camurati, Marco Palena, Paolo Pasini and Danilo Vendraminetto

Interpolation-based learning as a means to speed-up Bounded Model Checking (Short paper)

    • Zhi Zhang, Na Robby, John Hatcliff, Yannick Moy and Pierre Courtieu

Focused Certification of an Industrial Compilation and Static Verification Toolchain

    • Peizun Liu and Thomas Wahl

IJIT: An API for Boolean Program Analysis with Just-in-Time Translation

    • Vincent Leilde, Vincent Ribaud, Ciprian Teodorov and Philippe Dhaussy

A diagnosis framework for critical systems verification (Short paper)

    • Jeff Kramer (Imperial College London, United Kingdom)

The Challenge of Change

    • Chi Mai Nguyen, Roberto Sebastiani, Paolo Giorgini and John Mylopoulos

Modeling and Reasoning on Requirements Evolution with Constrained Goal Models

    • Bjørnar Luteberget, John J. Camilleri, Christian Johansen and Gerardo Schneider

Participatory Verification of Railway Infrastructure by Representing Regulations in RailCNL

    • Marie Farrell, Rosemary Monahan and James Power

Specification Clones: An empirical study of the structure of Event-B specifications

    • Nesredin Mahmud, Cristina Seceleanu and Oscar Ljungkrantz

Specification and Semantic Analysis of Embedded Systems Requirements: From Description Logic to Temporal Logic

    • Raj Mohan Matteplackel, Paritosh K Pandya and Amol Wakankar

Formalizing Timing Diagram Requirements in Discrete Duration Calculus

    • Paolo Masci, Yi Zhang, Paul Jones and Jose C. Campos

A Hazard Analysis Method for Systematic Identification of Safety Requirements for User Interface Software in Medical Devices

    • Fotios Gioulekas, Peter Poplavko, Rany Kahil, Panagiotis Katsaros, Marius Bozga, Saddek Bensalem and Pedro Palomo

Design of embedded systems with complex task dependencies and shared resource interference (Short paper)

    • Lom Messan Hillah, Rodrigo Assad, Antonia Bertolino, Marcio Delamaro, Fabio De Rosa, Vinicius Garcia, Francesca Lonetti, Ariele-Paolo Maesano, Libero Maesano, Eda Marchetti, Breno Miranda, Auri Vincenzi and Juliano Iyoda

Towards automated deployment of self-adaptive applications on hybrid clouds (Short paper)

    • Alberto Sangiovanni-Vincentelli (Berkeley University, United States)

A Formal Contract-Based Design Methodology for CyberPhysical Systems

    • Marie-Christine Jakobs

PART_PW: From Partial Analysis Results To a Proof Witness

    • Duncan Attard and Adrian Francalanza

Trace Partitioning and Local Monitoring for Asynchronous Components

    • Ermenegildo Tomasco, Truc Nguyen Lam, Bernd Fischer, Salvatore La Torre and Gennaro Parlato

Using Shared Memory Abstractions to Design Eager Sequentializations for Weak Memory Models

    • Laurent Georget, Mathieu Jaume, Guillaume Piolle, Frédéric Tronel and Valérie Viet Triem Tong

Information Flow Tracking for Linux Handling Concurrent System Calls and Shared Memory

    • Rudrapatna Shyamasundar and Narendra Kumar Nelabhotla

A Complete Generative Label Model for Lattice-based Access Control Models

    • Daniel Ricardo Dos Santos and Silvio Ranise

On Run-time Enforcement of Authorization Constraints in Security-Sensitive Business Processes

    • Simon Greiner, Martin Mohr and Bernhard Beckert

Modular Verification of Information-Flow Security in Component-Based Systems

    • Natasha Danas, Tim Nelson, Lane Harrison, Shriram Krishnamurthi and Daniel J. Dougherty

User Studies of Principled Model Finder Output

    • Matteo Camilli, Angelo Gargantini, Patrizia Scandurra and Carlo Bellettini.

Towards Inverse Uncertainty Quantification in Software Development (Short paper)

    • Guglielmo Fachini and Alberto Momigliano.

Validating the Meta-Theory of Programming Languages (Short paper)