• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

FacebookTwitterLinkedInInstagramYoutube
  • Home
  • /Digital Library
  • /Magazines
  • /Sp
  • Home
  • / ...
  • /Magazines
  • /Sp

CLOSED Call for Papers: Theme Issue on Formal Methods at Scale

Formal methods (FM) have a rich history spanning a half-century. Mathematical proof of properties of programs have been sought since the early days of computing. Despite these aspirations, FM has not taken hold due to barriers of scale, usability, engineering realism, and mission incentives. Indeed, for decades, FM tools and ecosystems could only operate on problems and systems of modest scale. There has nonetheless been strong impetus to continue the advance of FM driven by emerging uses of computing hardware and software in critical systems such as space and aircraft flight control, communication security, and cryptography. Recently, however, FM has advanced to the point that techniques are breaking through the barriers and being adopted in a broader range of engineering organizations where reliability and assurance are highly critical, particularly in cloud infrastructure, operating system kernels, and other applications. This is timely, because assurance needs are ramping up due to the growing sophistication of modern cyber threats, as well as the increase in complexity and interconnection of systems. Indeed, many of the modern applications of FM address scale and interconnection challenges through emphasis on composition, integration with modern tooling, and better accessibility for mainstream software developers, including invisible FM, where FM-originated techniques are built in to languages and tools in ways that yield the benefits while nonetheless “hiding the math” from developers.

This special issue of IEEE Security & Privacy aims at understanding how the FM community, working in partnership with sponsors and users, is achieving broader use of this critical technology and at increasing levels of scale. Still further, this special issue seeks to present this discussion in a form accessible to a general audience of researchers and practitioners thereby increasing the understanding of the community around FM. In the long history of FM, we have experienced both major steps forward and also some crises of expectations. Some have suggested that we might be at a new inflection point--and so it is important to consider the landscape. Topics include, but are not limited to:

  • Dimensions of scale, to include
    • The range of properties and qualities that are modeled and reasoned about, such as relating to security, safety, performance, fault tolerance, and real-time;
    • Complexity and the size of systems and their supply chains, including issues related to composability;
    • Efficiency of FM-related modeling, tooling, and engineering practices, including integration into mainstream tooling and practices;
    • Ability to rapidly co-evolve systems and associated evidence; and
    • Ease of use for non-expert developers and evaluators.

  • Dimensions of experience, to include
    • Experiences that can help ground our conversation and help us understand cross-cutting considerations such as commonalities in technical foundations and challenges relating to adoption into practice and tooling;
    • Applications to specific major systems in government and industry;
    • Tour-de-force results, such as proofs of significant mathematical results or reasoning about modern processors;
    • Advancement of FM ecosystems surrounding the various provers and stacks; and
    • Integration of more limited capabilities into broader communities of practice, such as has been happening in major tech firms.

Important Dates

Submissions due: 30 November 2021

Publication: May/June 2022

Submission Guidelines

For author information and guidelines on submission criteria, please visit the Author Information page. Please submit papers through the ScholarOne system, and be sure to select the special-issue name. Manuscripts should not be published or currently submitted for publication elsewhere. Please submit only full papers intended for review, not abstracts, to the ScholarOne portal.

Guest Editors

Contact the guest editors at sp3-22@computer.org.

  • Patrick Lincoln, SRI, Director CSL
  • William “Brad” Martin, DARPA, I2O PM
  • William Scherlis, DARPA, I2O Director

LATEST NEWS
From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities
From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Autonomous Observability: AI Agents That Debug AI
Autonomous Observability: AI Agents That Debug AI
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Read Next

From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities

IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT

Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)

Autonomous Observability: AI Agents That Debug AI

Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference

Copilot Ergonomics: UI Patterns that Reduce Cognitive Load

The Myth of AI Neutrality in Search Algorithms

Gen AI and LLMs: Rebuilding Trust in a Synthetic Information Age

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter