Accepted papers

  1. Xuan Bach Le, Thanh Toan Nguyen, Wei-Ngan Chin and Aquinas Hobor. A Certified Decision Procedure for Tree Shares

  2. Zhengkui Zhang, Brian Nielsen, Kim Guldstrand Larsen, Gilles Nies, Marvin Stenger and Holger Hermanns. Pareto Optimal Reachability Analysis for Simple Priced Timed Automata

  3. Si Liu, Peter Csaba Ölveczky, Jatin Ganhotra, Indranil Gupta and José Meseguer. Exploring Design Alternatives for RAMP Transactions through Statistical Model Checking

  4. Dongjing Miao and Zhipeng Cai. Parameterized Complexity of Resilience Decision for Database Debugging

  5. Li Li, Naipeng Dong, Jun Pang, Jun Sun, Guangdong Bai, Yang Liu and Jin Song Dong. A Verification Framework for Stateful Security Protocols

  6. Adnan Rashid and Osman Hasan. Formal Analysis of Linear Control Systems using Theorem Proving

  7. Marie Farrell, Rosemary Monahan and James Power. Combining Event-B and CSP: An Institution Theoretic approach to Interoperability

  8. Jiaying Li, Jun Sun, Bo Gao and Étienne André. Classification based Parameter Synthesis for Parametric Timed Automata

  9. Taolue Chen, Fu Song and Zhilin Wu. Model Checking Pushdown Epistemic Game Structures

  10. Zhiwu Xu, Cheng Wen and Shengchao Qin. Learning Types for Binaries

  11. Juliana Küster Filipe Bowles and Marco B. Caminati. A Flexible Approach for Finding Optimal Paths with Minimal Conflicts

  12. Long H. Pham, Ly Ly Tran Thi and Jun Sun. Assertion Generation through Active Learning

  13. Yi Yin, Yun Wang, Yuichiro Tateiwa, Yoshiaki Katayama and Naohisa Takahashi. Inconsistency Analysis of Time-Based Security Policy and Firewall Policy

  14. Min Zhang, Yuxin Deng and Guoqing Lei. An Algebraic Approach to Automatic Reasoning for NetKAT based on its Operational Semantics

  15. Zhao Duan and Cong Tian. Verifying Temporal Properties of C Programs via Lazy Abstraction

  16. Manuel Töws and Heike Wehrheim. Policy Dependent and Independent Information Flow Analyses

  17. Xiaohong Chen, Ling Yin, Yijun Yu and Zhi Jin. Transforming Timing Requirements into CCSL Constraints to Verify Cyber-Physical Systems

  18. Thomas Göthel, Nils Jähnig and Simon Seif. Refinement-Based Modelling and Verification of Design Patterns for Self-Adaptive Systems

  19. Hao Jiang, Hongli Yang, Shengchao Qin, Zhendong Su, Jian Zhang and Jun Yan. Detecting Energy Bugs in Android Apps Using Static Analysis

  20. Patrick Doolan, Graeme Smith, Chenyi Zhang and Padmanabhan Krishnan. Improving the Scalability of Automatic Linearizability Checking in SPIN

  21. Tingting Wu, Yunwei Dong, Tsong Yueh Chen, Mingyue Jiang, Man Lau, Fei-Ching Kuo and Sebastian Ng. Integration of Metamorphic Testing with Program Repair Methods Based on Adaptive Search Strategies and Program Equivalence

  22. Xin Li and Mizuhito Ogawa. A Sliding-Window Algorithm for On-The-Fly Interprocedural Program Analysis

Conditional accepted papers

  1. Guoqiang Li, Yuwei Wang, Yunqing Wen and Shoji Yuen. Nested Timed Automata with Diagonal Constraints

  2. Jingyi Wang, Xiaohong Chen, Jun Sun and Shengchao Qin. Improving Probability Estimation through Active Probabilistic Model Learning

  3. Yunhao Liu, Xiaohong Li, Zhiyong Feng and Jianye Hao. An Improved Android Collusion Attack Detection Method Based on Program Slicing

  4. Fabian Benduhn, Thomas Thüm, Ina Schaefer and Gunter Saake. Modularization of Refinement Steps for Agile Formal Methods

  5. Sylvain Conchon, David Declerck and Fatiha Zaidi. Model Checking Safety Properties of Parameterized x86-TSO Programs

  6. Bofang Zhang, Yihai Chen, Ridha Khedri and Huaikou Miao. A Framework of Multi-view Reconciliation for Medical Device Software