[TYPES/announce] Call for Papers: Unsound - Sources of Unsoundness in Verification (Deadline Extension: 2022-09-16)

Jan Bessai jan.bessai at tu-dortmund.de
Fri Sep 2 16:43:05 EDT 2022


==================================================================
                   Call for Papers

                       Unsound:
    1st Workshop on Sources of Unsoundness in Verification
                    at SPLASH 2022
       https://urldefense.com/v3/__https://2022.splashcon.org/home/unsound-2022__;!!IBzWLUs!XVIDunRXNjARnUZmCH0D2auGeqoNvaxt4UWBtjmM6brQJUYsepQTqotN7hFP87p3eXdO-bwgibATu2fJf9n2XdWSDrPpRUbs9cCB3qXY$  

Software and proof verification has grown significantly in the last 15 
years.
Growth has come to the point where verification systems are complex and 
manually proving the soundness of those verification systems sometimes 
exceeds what a single research group can understand and verify as 
correct.

Even formally defining soundness can be challenging and its definition 
is varying from system to system. Specific research groups can have very 
specific notions of soundness they focus on, but those can diverge from 
what the users expect, especially if the users come from a different 
verification environment or they are approaching verification for the 
first time.

Participants to Unsound will be able to share their experience and 
exploits on how different verification tools can either be broken or 
expose confusing behavior, likely to be unexpected by users.
We think this would be greatly beneficial not only because it will help 
all of us to iron out those unsoundnesses but also because it will 
facilitate understanding of the foundational differences between the 
assumptions of the various research lines.

The current academic environment encourages us to talk about the success 
case of our work. In this workshop we want to address and learn from 
failure cases and we want to reinforce the bedrock of our understanding.
In practice, when we divert our focus to a specific aspect of 
verification
  we may (understandably) be less precise.
For example, a line of research focusing on aliasing control in OO may 
be less precise when considering the implication in other areas, like 
termination.
We believe that learning from the issues of many verification projects 
can broaden the attention of researchers to topics which so far escaped 
their focused area of research; e.g., from only type correctness to also 
avoiding stack overflows.

We believe that this environment would be particularly beneficial for 
young researchers that are in search of open questions in verification. 
This may provide a motivation to deep dive into the details of any 
particular tool, or to expand their individual area of expertise to get 
a wider and more objective and critical view of the whole area of 
verification.

We also wonder if in our fast expansion we accidentally glossed over 
some fundamental issue in verification, and if our mistake has now 
become engraved into the established wisdom and it is sometimes 
uncritically assumed as a valid reasoning stepping stone.

We are particularly interested in sources of unsoundness that are 
accidentally shared by many different unrelated research lines, and to 
develop an understanding on why this is the case.

The workshop would be its first instance and is meant to be welcoming
for both people with strong theoretical skills, as well as people who
just like hacking things. We do not expect fully polished submissions
and we will not have formal proceedings. Students are especially welcome 
to attend.


### Examples for possible contributions would be:

* Definition of sound and unsound and how they can diverge between 
tools.
* Divergences between user assumptions and actual definitions of 
soundness.
* Common sources of unsoundness and why they emerge.
* Bugs and unsoundnesses in the process of extracting a concrete program
    from a verified environment, e.g., from Coq to Haskell.
* Logic errors in the specification of a verification tool, e.g., 
universe
   inconsistencies.
* Bugs in the implementation of proof checkers.
* Overconfident generalizations of sound subsystems to larger settings, 
e.g., imperative techniques in OO settings.
* Disproving soundness statements in published papers about 
verification.
* Finding statements proven in published literature that should no 
longer be trusted because they relied on a broken verification system.
* Simply proving False in a verification tool, in particular we are
   interested in practical ways to trick available tools to accept wrong
   statements.
* Breaking reasoning about programs with types by breaking the type
   system of the programming language in new and interesting ways.
* Bad interactions between axiomatic choices in libraries used in 
proofs.
* Impacts of the false sense of security when the chain of trust is 
broken by
   subtle unsoundness in verification tools.


### Contributions:

*Extended Deadline: 2022-09-16 (23:59 AOE)*
Submissions should have 3 pages of text. Additional material 
(bibliography, related work, and code examples) will not count toward 
this limit.
We strongly encourage authors to include instructions to reproduce 
results or exploits.

There will be a friendly peer review process, focusing on checking that 
the submitted material is appropriate for the workshop.

#### Publication
Informal proceedings will be made publicly available on the workshop web 
page. However, presentation at Unsound does not count as prior 
publication, and can later be published at a conference of the authors' 
choosing.

### Instruction to Authors

#### Submission

Authors should be aware of ACM’s policies on plagiarism 
(https://urldefense.com/v3/__https://www.acm.org/publications/policies/plagiarism__;!!IBzWLUs!XVIDunRXNjARnUZmCH0D2auGeqoNvaxt4UWBtjmM6brQJUYsepQTqotN7hFP87p3eXdO-bwgibATu2fJf9n2XdWSDrPpRUbs9VUwQbnY$  ).

Program Committee members are allowed to submit papers.

Papers must be submitted online at:
https://urldefense.com/v3/__https://unsound2022.hotcrp.com/__;!!IBzWLUs!XVIDunRXNjARnUZmCH0D2auGeqoNvaxt4UWBtjmM6brQJUYsepQTqotN7hFP87p3eXdO-bwgibATu2fJf9n2XdWSDrPpRUbs9TjWt0rM$  

#### Formatting:

Submitted papers should be in portable document format (PDF), formatted 
using the ACM SIGPLAN style guidelines. Authors should use the acmart 
format, with the acmsmall sub-format for ACM proceedings. For details, 
see:

https://urldefense.com/v3/__http://www.sigplan.org/Resources/Author/*acmart-format__;Iw!!IBzWLUs!XVIDunRXNjARnUZmCH0D2auGeqoNvaxt4UWBtjmM6brQJUYsepQTqotN7hFP87p3eXdO-bwgibATu2fJf9n2XdWSDrPpRUbs9Q4SqRKB$  

It is recommended to use the review option when submitting a paper; this 
option enables line numbers for easy reference in reviews.


More information about the Types-announce mailing list