CeMoSS 2014

CeMoSS – Certification and Model-Driven Development of Safe and Secure Software

Michaela Huhn, Stefan Gerken, Carsten Rudolph

Important Dates

Paper submission 31. December 2013
Notification of acceptance 13. January 2014
Submission of camery ready version 27. January 2014
Workshop 26. February 2014


Please use EasyChair for submissions.

Workshop Topics and Goals

Software is a key factor driving the innovation of many technical products and infrastructures for everyday use. Dependable software requires rigorous quality assurance in particular to achieve an adequate level of safety and information security. In many domains like avionics, power generation and distribution, industrial automation, railway and automotive, as well as medical devices and health information systems, dependable systems and the software therein have to be formally approved with respect to safety and security and certified according to international norms and standards, before being put in operation. Against all domain-specific singularities, the following issues challenging the development of safe and secure software shall be addressed in the workshop and discussed by a cross-domain audience:

  1. Model-driven software development with extensive tool support becomes more and more accepted in industry. Although safety standards recommend the formal foundations and systematics a model-driven approach relies on, advanced features of model driven development frameworks like automated code generation, model transformation and model checking are not yet adequately addressed in the standards. Thus using new methods and tools brings new risks into the certification of a product since it requires additional arguments in the assurance case just because the development deviates from the best-practice procedure, even if there is strong evidence that the new approach outperforms the older one with respect to error avoidance or error disclosure.

  2. Critical infrastructures and dependable systems are no longer operated in isolation, but connected to other company networks or accessed by mobile devices using the public telecommunication infrastructure like in smart home environments or car to car communication. Connectivity is an enabling factor for enhanced services, but also raises new threats from the newly introduced dependency between functional safety and IT security. New modeling approaches shall integrate safety and IT security issues in risk and safety analysis and design. Open issues are in particular the integration of safety and security processes, risk acceptance criteria that take both, safety and security into account,even for architectures of commercial systems with a life-cycle of a few decades and a holistic view on safety and security in the assurance case.

  3. Open source software has been introduced in the realm of dependable systems as tools in supporting processes, but first usages of open source components as part of the dependable system itself are under development (See the European project OpenETCS). In case open source software is used exactly as versioned and documented, it may be certified according to IEC 61508 or other relevant standards. However, the development or adaption of dependable software in an open source project raises new questions about adequacy of processes, tools and the competences of personnel. Finally, the balance between the developing and operating staff and bodies, and the users of dependable systems has to be newly discussed.

Topics of interest include but are not limited to: risk analysis, integration of safety and security, seamless tracing and decomposition of safety and security constraints, safety and assurance cases, modular certification, qualification of methods and tools, external proof checking of formal V & V results.

The CeMoSS-workshop shall foster the cross-domain discussion of challenges and possible solutions in the development of high assurance systems and infrastructure between academia and industry. Thus contributions reporting original research ideas as well as experience reports raising open questions from industrial practice are most welcome.


It is possible to submit the following formats:

  • Full technical paper (8 -12 pages): Original research contributions, experience reports, case studies, surveys and comparisons, the state-of-the-art reports

  • Short Papers and extended abstracts (4 - 6 pages): Position papers, challenge problems, tool demonstrations, PhD proposals, work in progress papers, extended abstracts


Full technical submissions will be judged on the basis of originality, contribution to the field, technical and presentation quality, and relevance to the symposium; short papers will be judged on clarity of description and the promise of interesting results; Short papers and extended abstracts will be judged on relevance to the workshop. All papers will be peer-reviewed by at least three program committee members.


Email: zemoss@in.tu-clausthal.de


Michaela Huhn,  TU Clausthal

Stefan Gerken,  Siemens AG

Carsten Rudolph,  Fraunhofer SIT,  Darmstadt


TU Clausthal GI

Siemens AG

Fraunhofer SIT