Monday 6 December and Tuesday 7 December, 2010, Austin, Texas,
USA
The Fourth Annual Layered Assurance Workshop (LAW 2010)
This will be the fourth in the Layered Assurance Workshop
(LAW)
series, sponsored by Air Force Cryptographic Modernization Program
Office (CMPO) and Air Force Research Laboratory (AFRL).
Proceedings
Check this web site after the Workshop for links to the
proceedings. Access proceedings of previous LAWs from the main
LAW web
page.
Venue
The Fourth Layered Assurance Workshop will be held at the Four Seasons
Austin, on Lady Bird Lake (aka "Town Lake"), in Austin, Texas.
Workshop Background and Description
The Fourth Layered Assurance Workshop (LAW) will be held in Austin,
Texas, December 6-7, 2010. The LAW Organizing Committee in conjunction
with Applied Computer Security Associates is pleased to have LAW as an
affiliated workshop of the 26th Annual Computer
Security Applications Conference (ACSAC) December 6-10, 2010. If you
have attended a previous
meeting of the LAW we believe you will find this year's LAW and ACSAC
to provide a greater opportunity for exposure to the latest
developments in applied computer security.
LAW has provided a forum for vital exchange, as well as a maturing
source of information, focused on key issues relating to the effective
and efficient modular construction and certification of assured systems
from assured components. It is widely recognized that such an approach
is the most promising way to achieve diverse and flexible systems that
can be certified quickly and cost effectively. LAW is concerned with
the theoretical, engineering, and certification challenges to be met
before this goal can be fully realized.
The Workshop concerns itself with the fundamental problems of
“compositional assurance” and with a need for principles, methods, and
techniques that can be applied to achieve the assurance necessary for
security-critical, safety-critical, and mission-critical components and
systems.
For the past three years, the Layered Assurance Workshop has grown
and evolved. The first LAW in 2007 took an exploratory approach,
relying heavily on the participants' input to establish the agenda. The
second LAW in 2008 was attended by approximately 80 individuals
representing more than 30 distinct organizations. In that Workshop more
of the program was established in advance, with several keynote talks
chosen from responses to an open invitation, followed by breakout
sessions on diverse topics. The third LAW comprised two thematic days
with a common structure: morning keynote talks, afternoon panels and
breakout sessions. The theme of the first day was programmatic needs of
government, while that of the second day was research and development
on the problems of layered assurance.
This year, the fourth LAW will include talks by distinguished
speakers, panels, discussions and technical training. Attendees are
encouraged to participate in ACSAC in addition to LAW. The conjunction
of LAW and ACSAC provides increased opportunities for academic and
industry participants to contribute in the forum of their choice.
Please pass along information about LAW to colleagues who may be
interested.
The workshop is unclassified and will be open to all attendees.
Please see the ACSAC web site for
more information about ACSAC. As a result of the transition to make LAW
a permanent ACSAC workshop, there is now a LAW registration fee. This
year, to ease the transition for attendees, the LAW sponsors have
generously provided a sponsorship for early registrants.
Hotel Reservations and Workshop Registration
Links for hotel reservations and registration for LAW and ACSAC are
provided on the
ACSAC web site.
LAW
registration
discounts
still
available!
These
are
not
based
on a date -
first come, first served.
The registration fee for LAW is 200ドル. To ease the transition for
attendees this year, the LAW sponsors have
generously provided a sponsorship for early registrants. There are
three discount
categories (affiliation
and status subject to verification): 33 discounts of
100ドル for government employees, 30 discounts of 80ドル for
industry/academic, and 15 discounts of 100ドル for full-time students, all
available on a first-come, first-served basis. The discount is accessed
by a code that is made available during the ACSAC registration process:
look for the early bird discount link in the "Special Code" block on
the "Contact Information" page. When all the available early bird
discounts in each category have been applied, the code will no longer
produce a discount.
Workshop Program
Contributed
papers will be linked to the program shortly after December 1, prior to
the commencement of LAW.
Presentations will be linked to the program shortly after the
conclusion of LAW.
The LAW Business Meeting scheduled after the conclusion of sessions on
Monday December 6 is open to all interested individuals. Planning for
LAW 2011 will commence. Participation is encouraged.
LAW attendees are invited to attend the ACSAC Reception on Tuesday
December 7 at 6 PM.
The names of
invited
speakers and presenting authors are underlined in the Program
following.
A pdf of the program is
here.
Monday December 6
07:30-08:30
BREAKFAST
08:30-09:00
Welcome
and Opening Remarks
Rance DeLong, Consultant
Gordon Uchenick, Coverity
Carolyn Boettcher, Raytheon
09:00-10:00
Keynote:
Software
Assurance: Enabling Software Resilience
and Mitigating Supply Chain
Risk
Joe
Jarzombek
Director
for
Software
Assurance
National
Cyber
Security
Division
U.S.
Department
of
Homeland
Security
paper
slides
10:00-10:30
BREAK
10:30-12:00
Invited Talks:
Applying
a Compositional Method to Incrementally Prove
Critical Properties of an
Airlock System
Elizabeth Leonard
Naval
Research
Laboratory
paper
slides
On Components and
Composition in Constructing
and Certifying Secure Software
Constance
Heitmeyer
Naval
Research
Laboratory
paper
slides
DISCUSSION
12:00-13:30
LUNCH
13:30-15:00
Contributed Papers and Discussion:
Trust Distribution
Diagrams: Theory and Application
Michael Locasto,
University
of Calgary;
Steven
Greenwald,
Consultant;
and
Sergey
Bratus,
Dartmouth
College
paper
slides
Boundary Flow Modeling
Richard Neely
Märzen
Group
LLC
paper
slides
DISCUSSION
15:00-15:30
BREAK
15:30-16:30
Invited Talk:
Incremental
Verification
and
Validation
of
System Architecture
for Software Reliant Systems
Using the AADL
Bruce Lewis
US
Army
ARMDEC,
Redstone
Arsenal
paper
slides
16:30-17:30
Contributed Papers:
Affordable,
Fact-Oriented Assurance with OMG standards
Nikolai Mansourov
and Djenana Campara,
KDM
Analytics
paper
slides
Redefining Static
Analysis: A Standards Approach
Rama
Moorthy
and
Mike Oara,
Hatha
Systems
paper
slides
17:30-18:00
LAW Business Meeting and LAW 2011
Planning
Tuesday December 7
07:30-08:30
BREAKFAST
08:30-09:00
Prefatory Remarks
Rance DeLong
09:00-10:00
Keynote:
What is
Assurance?
John Rushby
Program
Director
-
Formal
Methods
and
Dependable
Systems
SRI
International
paper
slides
10:00-10:30
BREAK
10:30-11:30
Invited Talk:
Commercial Hardware
Assurance -- Validation of the VIA Nano
Warren A. Hunt, Jr.
Professor
University
of
Texas
at
Austin
paper
slides
11:30-12:00
Contributed Paper:
Capabilities Revisited:
A Holistic Approach to Bottom-to-Top
Assurance
of
Trustworthy
Systems
Peter Neumann,
SRI
International; and
Robert
Watson,
Cambridge
University
paper
slides
12:00-13:30
LUNCH
13:30-15:00
Contributed Papers and Discussion:
Separation Kernel
Protection Profile Revisited:
Choices and Rationale
Timothy
E.
Levin,
Thuy
D.
Nguyen,
Cynthia E. Irvine,
Naval
Postgraduate
School;
and
Michael
McEvilley,
MITRE
paper
slides
An Evaluation and
Certification Scheme for MILS
Rance DeLong
The
Open
Group
paper
slides
DISCUSSION
15:00-15:30
BREAK
15:30-17:30
Contributed Papers and Discussion:
A Data-Centric Approach
for Modular Assurance
Gabriela Ciocarlie,
Heidi
Schubert
and
Rose
Wahlin,
Real-Time
Innovations
paper
slides
State-of-the-Art in
System-of-Systems Security for
Crisis Management
Kashif
Kifayat,
Abdullahi
Arabo,
Oliver
Drew, Madjid Merabti,
David
Llewellyn-Jones,
and
Qi
Shi,
Liverpool
John
Moores
University;
and
Adrian Waller,
Rachel Craddock, and Glyn Jones
Thales
Research
and
Technology
paper
slides
A Security Scheme for
Home Networked Appliances
Mazhar Ul Hassan,
Madjid
Merabti
and
David
Llewellyn-Jones,
Liverpool
John
Moores
University
paper
slides
DISCUSSION
17:30-17:45
Closing Remarks
18:00-20:00
RECEPTION
LAW Organizing Committee
George Abrego
MITRE
Carolyn Boettcher
Raytheon
Joyce Brookins
Air Force Cryptographic
Modernization Program Office (CMPO)
Rance J. DeLong
LynuxWorks, Santa Clara University, consultant
Thomas Hui
Air Force Cryptographic
Modernization Program Office (CMPO)
Michael Putney
MITRE
Wilmar Sifre
AFRL Information Directorate,
Computing Architectures Branch
Contact: Workshop Chairman
Rance J. DeLong --
LynuxWorks, Santa Clara
University, Consultant