Over the past several years, we have seen a rapid rising emphasis on design, implement and manage complex computer systems which are present in every aspect of human activities, such as manufacturing, communications, defense, transportation, aerospace, hazardous environments, energy, and health care. The complex computer systems are frequently distributed over heterogeneous networks and processing large amount data. Complexity arises from many factors, including the dynamic environments and scenarios these systems operate in; demanding and sometimes conflicting requirements in functionality, efficiency, scalability, security, dependability and adaptability; as well as the large variation in development methodology, programming languages and implementation details. The key issues in these systems include performance, real-time behavior, fault tolerance, security, adaptability, development time and cost, and long life concerns.
The goal of this conference is to bring together industrial, academic, and government experts, from a variety of application domains and software disciplines, to discuss how the disciplines' problems and solution techniques interact within the whole system. Researchers, practitioners, tool developers and users, and technology transfer experts are all welcome. The scope of interest includes long-term research issues; near-term requirements and challenges; established complex systems; emerging promising tools; and retrospective and prospective reflections of research and development into complex systems.
ICECCS is an A-ranked international conference by the Computing Research and Education Association of Australasia (CORE) 2018 ranking.
This year's ICECCS will be held in Nansha, Guangzhou right after the 21st International Conference on Formal Engineering Methods (ICFEM 2019) in Shenzhen, China. We would like to encourage you to attend both conferences with one business trip.
Abstract Submissions Due:
24 May 2019 AOE 31 May 2019 AOE (extended)
Full Paper Submissions Due:
31 May 2019 AOE 14 June 2019 AOE (extended)
Acceptance/Rejection Notification: 20 July 2019
Camera-ready Due: 16 August 2019
Authors are invited to submit papers describing original, unpublished research results, case studies and tools. Papers are solicited in all areas related to complex computer-based systems, including the causes of complexity and means of avoiding, controlling, or coping with complexity. Topic areas include, but are not limited to:
Different kinds of contributions are sought, including novel research, lessons learned, experience reports, and discussions of practical problems faced by industry and user domains. The ultimate goal is to build a rich and comprehensive conference program that can fit the interests and needs of different classes of attendees: professionals, researchers, managers, and students. A program goal is to organize several sessions that include both academic and industrial papers on a given topic and culminate panels to discuss relationships between industrial and academic research.
Full papers are divided into two categories: Technical Papers and Experience Reports. The papers submitted to both categories will be reviewed by program committee members, and papers accepted in either category will be published in the conference proceedings. Technical papers should describe original research, and experience reports should present practical projects carried out in industry, and reflect on the lessons learnt from them.
Short paper submissions describe early-stage, ongoing or PhD research. All short papers will be reviewed by program committee members, and accepted short papers will be published in the conference proceedings.
Submitted manuscripts should be in English and formatted in the style of the double-column CPS format. Full papers should not exceed 10 pages, and short papers should not exceed 4 pages, including figures, references, and appendices. All submissions should be in PDF format. Submissions not adhering to the specified format and length may be rejected immediately, without review.
Please prepare your manuscripts in accordance to the (CPS guidelines). We invite all prospective authors to submit their manuscripts via the ICECCS'19 portal, hosted on EasyChair.
Access submission portal
Besides the standard main conference track, ICECCS will host a number of workshops and tutorials related to the theme of the conference. The goal of the workshops is to provide participants with a platform to present and discuss their novel ideas; the goal of the tutorials is to provide a platform to elaborate the theoretical and applicable aspects of their research.
Please write your proposals in English, and submit in PDF format via email to the ICECCS workshop/tutorial chair, Guangdong Bai (firstname.lastname@example.org).
Submission of proposals: 20 June 2019 AOE
Notification: 1 July 2019 AOE
|Student Early Registration (until 22/09/2019)||Early Registration (until 22/09/2019)||Student Late Registration (after 22/09/2019)||Late Registration (after 22/09/2019)|
|Price||650 USD||800 USD||750 USD||900 USD|
Note that authors' registration due date is 08/09/2019.
Discounted registration fee has been provided to the ICFEM 2019 delegates at US$700.
Note: the location of ICECCS2019 has been changed to Nansha, Guangzhou, China. Guangzhou is the third largest city in China and a thriving commercial centre. Its location on the Pearl River and proximity to Hong Kong has made Guangzhou a strategic port for centuries. Glimpse old temples and gleaming steel towers on an architectural tour. Visit one of four Chimelong theme parks for thrills and chills. Once called Canton, Guangzhou is considered the home of traditional (read Cantonese) “Chinese food.” Foodies will find more restaurants per capita here than anywhere else in China.
Conference venue: ICECCS 2019 will be held at Nansha Grand Hotel. Located at the new coastal city of Nansha, Guangzhou. Nansha Grand Hotel is adjacent to the Nansha Port, a one-hour voyage to HongKong and Macau, and only ten minutes’ drive away from the nearest Metro station. At this predominant location, it is the only super deluxe five-star hotel by the sea in Guangzhou. The hotel is roughly 1 hour 25 min drive from the Guangzhou Baiyun International Airport, and 50 min drive from the Shenzhen Bao'an International Airpot.
Address: No.1 2nd South Trade road, New Coastal City, Nansha Guangzhou.
Phone: +86 20 3930 8888
For accommodation, we recommend staying at the conference hotel. The conference hotel has offered a discounted group rate for the ICECCS 2019 delegates during the conference period at CNY650 per night (Deluxe Sea-view Room with Double Breakfast, subject to availability). Please follow the reservation link to make your booking.
Otherwise, there are various options nearby. For example, the Guangzhou Zhongbang International Hotel offers affordable rooms within 25 min walking distance to the conference venue.
There are two options for travelling from the Guangzhou Baiyun international Airport: (1) Airport Bus Station -- (AIRPORT EXPRESS Line 7-C) --> Jiaomen station -- (METRO Line 4) --> Nansha Passenger Port Station. (2) Airport North Metro Station -- (METRO Line 3 North Extension) -- (METRO Line 3) -- (METRO Line 8) -- (METRO Line 4) --> Nansha Passenger Port Station
From Shenzhen Bao'an International Airport: Shenzhen Airport Bus Station -- (BUSINESS DEDICATED BUS, WeChat Booking Only) --> Nansha Passenger Station -- (BUS No.5 / No.3) --> Nansha Passenger Port Station
From Hong Kong International Airport (HKIA): Skypier (ferry service) at HKIA --> Guangzhou Nansha (Nansha Passenger Port). The fare is about HKD300 and duration of the trip is 70 minutes.
Additionally, the local organising team can help with arranging transportation services between the Guangzhou/Shenzhen airports and the conference hotel. The costs of the one-way service are US$85 for Car (exclusive) and US$30 for Mini-Bus (shared ride). Please follow the transportation reservation link to request your booking.
Attendee who requires a visa to enter China, please complete the invitation letter template and send it back to us for processing the official authorisation from the local committee. Note that we only issue visa invitation letters to the delegates who register and attend the conference.
Additional information on visa to China can be found here.
Tao Xie is a Chair Professor in the Department of Computer Science and Technology at Peking University, Beijing, China. He received an NSF CAREER Award, a Microsoft Research Outstanding Collaborator Award, a Microsoft Research Software Engineering Innovation Foundation (SEIF) Award, a Google Faculty Research Award, a Facebook Testing and Verification Research Award, an IBM Jazz Innovation Award, and three-time IBM Faculty Awards. He is a co-Editor-in-Chief of the Wiley journal of Software Testing, Verification and Reliability (STVR). He served as the ISSTA 2015 Program Chair and the Tapia 2017/2018 Program/General Chair, and will serve as an ICSE 2021 Program Co-Chair. He was selected by Lero as a David Lorge Parnas Fellow in 2019. He was named an ACM Distinguished Scientist in 2015 and an IEEE Fellow in 2018.
Title: Data-Driven Software Automation: Toward a Decades-Long Dream
Abstract: Software automation typically refers to the process of generating software automatically based on formal or informal specifications. In the research community, software automation has been a decades-long dream, where software developers are freed from tedious programming tasks for constructing the initial version of software, and from expensive software maintenance tasks for evolving the software to future versions in order to catch up with the changes from requirements or execution environments. Example software automation technologies include program synthesis, code completion, program transformation, code recommendation, program repair, and software self-evolution. In the past decade, software development, maintenance, and deployment produce a huge volume of software engineering data such as source code, version histories, feature specifications, bug reports, test cases, execution traces/logs, and real-world user feedback. These data supply a valuable source of inputs for software automation technologies. These data supplies provide great potential to substantially boost these technologies' effectiveness and efficiency toward realizing software automation in not only academic settings but also industrial settings. This talk discusses recent research and future directions in data-driven software automation, as an important objective in the increasingly popular fields of software analytics and intelligent software engineering.
Shang-Wei Lin is an Assistant Professor in School of Computer Science and Engineering of Nanyang Technological University (NTU). He received his Ph.D. degree in Computer Science and Information Engineering from the National Chung Cheng University in 2010. In 2011, he was a postdoctoral researcher in School of Computing, National University of Singapore (NUS). From 2012 to November 2014, he was a research scientist at Temasek Laboratories in National University of Singapore (NUS). From December 2014 to April 2015, he was a postdoctoral research fellow in Singapore University of Technology and Design (SUTD). He has joined NTU as Assistant Professor in April 2015. His research interests include formal verification, formal synthesis, embedded system design, cyber-physical systems, security systems, multi-core programming, and component-based object-oriented application frameworks for real-time embedded systems. Recently, he is working on applying formal methods on smart contract verification.
Title: Formal Verification based on Interpolations
Abstract: Formal verification techniques, such as model checking and theorem proving, have their challenging problems. For example, in symbolic model checking, one challenging problem is how to efficiently calculate a fix-point to over-approximate the system behavior for verifying a property. In program verification based on Hoare logic, one of the challenging problems is, given a loop, how to automatically generate an inductive loop invariant, which is not only strong enough to imply the post-condition but also weak enough to be implied by the pre-condition of the loop. In this talk, I will introduce several modern formal verification techniques based on interpolations and illustrate how interpolation helps to solve the above challenging problems. I will also discuss some future works in this research direction.
Fu Song is an Assistant Professor at School of Information Science and Technology in the ShanghaiTech University. Fu received his Ph.D. from University Paris Diderot (Paris 7) in 2013. He was an Associate Research Professor and Lecturer at School of Computer Science and Software Engineering in the East China Normal University during 2013-2016, and a visiting researcher at Computer Security Lab of Nanyang Technological University in 2014. His research spans formal verification, program analysis, computer security and deep learning. Fu has published more than 40 papers in peer-reviewed conferences and journals including CAV、ICSE、TACAS、FM、CONCUR、AAAI、IJCAI、I&C and ACM TOSEM. He has been the recipient of the EASST best paper award at ETAPS 2012.
Title: Formal Verification for Side-channel Resistance of Cryptographic Programs
Abstract: Cryptographic algorithms are widely used to protect data privacy in many aspects of our daily lives from smart card to cyber-physical systems. Unfortunately, programs implementing cryptographic algorithms may be vulnerable to practical power side-channel attacks, which infer private data via statistical analysis of the correlation between power consumptions of an electronic device and private data. To thwart these attacks, several masking schemes have been proposed, giving rise to effective countermeasures for reducing the statistical correlation between private data and power consumptions. However, programs that rely on secure masking schemes are not secure a priori. Indeed, designing effective masking programs is a labor intensive and error-prone task. Although some techniques have been proposed for formally verifying masking countermeasures and for quantifying masking strength, they are currently limited to Boolean programs and suffer from low accuracy. In this talk, I will present our recent results on formal verification of cryptographic programs against power side-channel attacks. First, I will talk about a refinement based qualitative verification approach that can be viewed as a synergistic integration of a rule-based approach for inferring distribution types and an model-counting based approach for refining these types. Second, I will present an algorithm for quantifying the amount of side-channel information leakage from a software implementation using the notion of quantitative masking strength. Finally, I will discuss some open problems for future work.
Zuohua Ding, Zhejiang Sci-Tech University, China
Jin Song Dong, Griffith University and NUS, Australia
Mike Hinchey, University of Limerick, Ireland
Mark Lawford, McMaster University, Canada
Xiaohong Li, Tianjin University, China
Shaoying Liu, Hosei University, Japan
Andrew Martin, University of Oxford, UK
Roy Sterritt, Ulster University, United Kingdom
Jing Sun, The University of Auckland, New Zealand
Guangdong Bai, Griffith University, Australia
Yun Tang, Nanyang Technological University, Singapore
Parosh Aziz Abdulla, Uppsala University, Sweden
Yamine Ait Ameur, IRIT/INPT-ENSEEIHT, France
Étienne André, Université Paris 13, France
Guangdong Bai, Griffith University, Australia
Luciano Baresi, Politecnico di Milano, Italy
Ezio Bartocci, Vienna University of Technology, Austria
Sergiy Bogomolov, Australian National University, Australia
Hadrien Bride, Griffith University, Australia
Lei Bu, Nanjing University, China
Mingsong Chen, East China Normal University, China
Yu-Fang Chen, National Taiwan University, Taiwan
Sebastien Gerard, CEA LIST, France
Nan Guan, The Hong Kong Polytechnic University, China
Matthew Hague, Royal Holloway University of London, United Kingdom
Zhe Hou, Griffith University, Australia
Kung-Kiu Lau, University of Manchester, United Kingdom
Scott Uk-Jin, Hanyang University, Korea
Yuan-Fang Li, Monash University, Australia
Shuang Liu, Tianjing University, China
David Lo, Singapore Management University, Singapore
Gerald Luettgen, University of Bamberg, Germany
Lei Ma, Kyushu University, Japan
Tiziana Margaria, Lero, Ireland
Dominique Mery, Université de Lorraine, France
Mohammadreza Mousavi, University of Leicester, United Kingdom
Paolo Nesi, University of Florence, Italy
Jun Pang, University of Luxembourg, Luxembourg
Soumya Paul, University of Luxembourg, Luxembourg
Christian Prehofer, Technical University of Munich, Germany
Bruce Sham, University of Auckland, New Zealand
Fu Song, ShanghaiTech University, China
Jing Sun, University of Auckland, New Zealand
Jun Sun, Singapore Management University, Singapore
Meng Sun, Peking University, China
Cong Tian, Xidian University, China
Tullio Vardanega, University of Padua, Italy
Hai H. Wang, University of Aston, United Kingdom
Haoyu Wang, Beijing University of Posts and Telecommunications, China
Hironori Washizaki, Waseda University, Japan
Zhilin Wu, Chinese Academy of Sciences, China
Chenyi Zhang, Jinan University, China
Huibiao Zhu, East China Normal University, China