Skip to main content

Showing 1–24 of 24 results for author: Briand, L C

.
  1. arXiv:2405.13254  [pdf, other

    cs.LG cs.AI cs.RO cs.SE

    System Safety Monitoring of Learned Components Using Temporal Metric Forecasting

    Authors: Sepehr Sharifi, Andrea Stocco, Lionel C. Briand

    Abstract: In learning-enabled autonomous systems, safety monitoring of learned components is crucial to ensure their outputs do not lead to system safety violations, given the operational context of the system. However, develo** a safety monitor for practical deployment in real-world applications is challenging. This is due to limited access to internal workings and training data of the learned component.… ▽ More

    Submitted 21 May, 2024; originally announced May 2024.

  2. arXiv:2402.10773  [pdf, other

    cs.CR cs.SE

    AIM: Automated Input Set Minimization for Metamorphic Security Testing

    Authors: Nazanin Bayati Chaleshtari, Yoann Marquer, Fabrizio Pastore, Lionel C. Briand

    Abstract: Although the security testing of Web systems can be automated by generating crafted inputs, solutions to automate the test oracle, i.e., distinguishing correct from incorrect outputs, remain preliminary. Specifically, previous work has demonstrated the potential of metamorphic testing; indeed, security failures can be determined by metamorphic relations that turn valid inputs into malicious inputs… ▽ More

    Submitted 21 February, 2024; v1 submitted 16 February, 2024; originally announced February 2024.

  3. Learning-Based Relaxation of Completeness Requirements for Data Entry Forms

    Authors: Hichem Belgacem, Xiaochen Li, Domenico Bianculli, Lionel C. Briand

    Abstract: Data entry forms use completeness requirements to specify the fields that are required or optional to fill for collecting necessary information from different types of users. However, some required fields may not be applicable for certain types of users anymore. Nevertheless, they may still be incorrectly marked as required in the form; we call such fields obsolete required fields. Since obsol… ▽ More

    Submitted 13 December, 2023; v1 submitted 22 November, 2023; originally announced November 2023.

    Comments: Accepted for publication by ACM Transactions on Software Engineering and Methodology

  4. arXiv:2308.02594  [pdf, other

    cs.LG cs.AI cs.SE

    SMARLA: A Safety Monitoring Approach for Deep Reinforcement Learning Agents

    Authors: Amirhossein Zolfagharian, Manel Abdellatif, Lionel C. Briand, Ramesh S

    Abstract: Deep reinforcement learning algorithms (DRL) are increasingly being used in safety-critical systems. Ensuring the safety of DRL agents is a critical concern in such contexts. However, relying solely on testing is not sufficient to ensure safety as it does not offer guarantees. Building safety monitors is one solution to alleviate this challenge. This paper proposes SMARLA, a machine learning-based… ▽ More

    Submitted 31 January, 2024; v1 submitted 3 August, 2023; originally announced August 2023.

  5. arXiv:2305.07097  [pdf, other

    cs.SE

    Automated Smell Detection and Recommendation in Natural Language Requirements

    Authors: Alvaro Veizaga, Seung Yeob Shin, Lionel C. Briand

    Abstract: Requirement specifications are typically written in natural language (NL) due to its usability across multiple domains and understandability by all stakeholders. However, unstructured NL is prone to quality problems (e.g., ambiguity) when writing requirements, which can result in project failures. To address this issue, we present a tool, named Paska, that takes as input any NL requirements, autom… ▽ More

    Submitted 25 November, 2023; v1 submitted 11 May, 2023; originally announced May 2023.

  6. arXiv:2301.13807  [pdf, other

    cs.SE cs.LG cs.NE cs.RO

    Identifying the Hazard Boundary of ML-enabled Autonomous Systems Using Cooperative Co-Evolutionary Search

    Authors: Sepehr Sharifi, Donghwan Shin, Lionel C. Briand, Nathan Aschbacher

    Abstract: In Machine Learning (ML)-enabled autonomous systems (MLASs), it is essential to identify the hazard boundary of ML Components (MLCs) in the MLAS under analysis. Given that such boundary captures the conditions in terms of MLC behavior and system context that can lead to hazards, it can then be used to, for example, build a safety monitor that can take any predefined fallback mechanisms at runtime… ▽ More

    Submitted 16 October, 2023; v1 submitted 31 January, 2023; originally announced January 2023.

    Comments: Accepted for publication by IEEE Transactions on Software Engineering (TSE)

  7. arXiv:2210.15469  [pdf, other

    cs.SE cs.CR cs.LG cs.NI

    Learning Failure-Inducing Models for Testing Software-Defined Networks

    Authors: Raphaël Ollando, Seung Yeob Shin, Lionel C. Briand

    Abstract: Software-defined networks (SDN) enable flexible and effective communication systems that are managed by centralized software controllers. However, such a controller can undermine the underlying communication network of an SDN-based system and thus must be carefully tested. When an SDN-based system fails, in order to address such a failure, engineers need to precisely understand the conditions unde… ▽ More

    Submitted 8 January, 2024; v1 submitted 27 October, 2022; originally announced October 2022.

  8. arXiv:2209.09722  [pdf, other

    cs.SE

    NLP-based Automated Compliance Checking of Data Processing Agreements against GDPR

    Authors: Orlando Amaral, Muhammad Ilyas Azeem, Sallam Abualhaija, Lionel C Briand

    Abstract: Processing personal data is regulated in Europe by the General Data Protection Regulation (GDPR) through data processing agreements (DPAs). Checking the compliance of DPAs contributes to the compliance verification of software systems as DPAs are an important source of requirements for software development involving the processing of personal data. However, manually checking whether a given DPA co… ▽ More

    Submitted 18 June, 2023; v1 submitted 20 September, 2022; originally announced September 2022.

    Comments: 26 pages, 5 figures, 10 tables, 1 Algorithm, Accepted for publication in TSE

  9. arXiv:2208.09505  [pdf, other

    cs.SE

    Metamorphic Testing for Web System Security

    Authors: Nazanin Bayati Chaleshtari, Fabrizio Pastore, Arda Goknil, Lionel C. Briand

    Abstract: Security testing aims at verifying that the software meets its security properties. In modern Web systems, however, this often entails the verification of the outputs generated when exercising the system with a very large set of inputs. Full automation is thus required to lower costs and increase the effectiveness of security testing. Unfortunately, to achieve such automation, in addition to strat… ▽ More

    Submitted 7 March, 2023; v1 submitted 19 August, 2022; originally announced August 2022.

    Comments: arXiv admin note: text overlap with arXiv:1912.05278

  10. A Machine Learning Approach for Automated Filling of Categorical Fields in Data Entry Forms

    Authors: Hichem Belgacem, Xiaochen Li, Domenico Bianculli, Lionel C. Briand

    Abstract: Users frequently interact with software systems through data entry forms. However, form filling is time-consuming and error-prone. Although several techniques have been proposed to auto-complete or pre-fill fields in the forms, they provide limited support to help users fill categorical fields, i.e., fields that require users to choose the right value among a large set of options. In this paper,… ▽ More

    Submitted 28 April, 2022; v1 submitted 17 February, 2022; originally announced February 2022.

    Comments: Accepted for publication by ACM Transactions on Software Engineering and Methodology

  11. arXiv:2110.14960  [pdf, other

    cs.IR

    An AI-based Approach for Tracing Content Requirements in Financial Documents

    Authors: Xiaochen Li, Domenico Bianculli, Lionel C. Briand

    Abstract: The completeness (in terms of content) of financial documents is a fundamental requirement for investment funds. To ensure completeness, financial regulators spend a huge amount of time for carefully checking every financial document based on the relevant content requirements, which prescribe the information types to be included in financial documents (e.g., the description of shares' issue condit… ▽ More

    Submitted 28 October, 2021; originally announced October 2021.

    Comments: 17 pages, 3 figures

  12. arXiv:2106.05688  [pdf, other

    cs.CR cs.AI cs.SE

    AI-enabled Automation for Completeness Checking of Privacy Policies

    Authors: Orlando Amaral, Sallam Abualhaija, Damiano Torre, Mehrdad Sabetzadeh, Lionel C. Briand

    Abstract: Technological advances in information sharing have raised concerns about data protection. Privacy policies contain privacy-related requirements about how the personal data of individuals will be handled by an organization or a software system (e.g., a web service or an app). In Europe, privacy policies are subject to compliance with the General Data Protection Regulation (GDPR). A prerequisite for… ▽ More

    Submitted 5 October, 2021; v1 submitted 10 June, 2021; originally announced June 2021.

  13. Optimal Priority Assignment for Real-Time Systems: A Coevolution-Based Approach

    Authors: Jaekwon Lee, Seung Yeob Shin, Shiva Nejati, Lionel C. Briand

    Abstract: In real-time systems, priorities assigned to real-time tasks determine the order of task executions, by relying on an underlying task scheduling policy. Assigning optimal priority values to tasks is critical to allow the tasks to complete their executions while maximizing safety margins from their specified deadlines. This enables real-time systems to tolerate unexpected overheads in task executio… ▽ More

    Submitted 21 March, 2022; v1 submitted 15 February, 2021; originally announced February 2021.

  14. arXiv:2101.01933  [pdf, other

    cs.SE

    Combining Genetic Programming and Model Checking to Generate Environment Assumptions

    Authors: Khouloud Gaaloul, Claudio Menghi, Shiva Nejati, Lionel C. Briand, Yago Isasi Parache

    Abstract: Software verification may yield spurious failures when environment assumptions are not accounted for. Environment assumptions are the expectations that a system or a component makes about its operational environment and are often specified in terms of conditions over the inputs of that system or component. In this article, we propose an approach to automatically infer environment assumptions for C… ▽ More

    Submitted 6 January, 2021; originally announced January 2021.

  15. Automatic Test Suite Generation for Key-Points Detection DNNs using Many-Objective Search (Experience Paper)

    Authors: Fitash Ul Haq, Donghwan Shin, Lionel C. Briand, Thomas Stifter, Jun Wang

    Abstract: Automatically detecting the positions of key-points (e.g., facial key-points or finger key-points) in an image is an essential problem in many applications, such as driver's gaze detection and drowsiness detection in automated driving systems. With the recent advances of Deep Neural Networks (DNNs), Key-Points detection DNNs (KP-DNNs) have been increasingly employed for that purpose. Nevertheless,… ▽ More

    Submitted 25 May, 2021; v1 submitted 11 December, 2020; originally announced December 2020.

    Comments: to appear in ISSTA 2021

  16. arXiv:2009.12250  [pdf, other

    cs.SE cs.FL cs.LO

    Trace-Checking CPS Properties: Bridging the Cyber-Physical Gap

    Authors: Claudio Menghi, Enrico Viganò, Domenico Bianculli, Lionel C. Briand

    Abstract: Cyber-physical systems combine software and physical components. Specification-driven trace-checking tools for CPS usually provide users with a specification language to express the requirements of interest, and an automatic procedure to check whether these requirements hold on the execution traces of a CPS. Although there exist several specification languages for CPS, they are often not sufficien… ▽ More

    Submitted 15 September, 2021; v1 submitted 25 September, 2020; originally announced September 2020.

  17. Estimating Probabilistic Safe WCET Ranges of Real-Time Systems at Design Stages

    Authors: Jaekwon Lee, Seung Yeob Shin, Shiva Nejati, Lionel C. Briand, Yago Isasi Parache

    Abstract: Estimating worst-case execution times (WCET) is an important activity at early design stages of real-time systems. Based on WCET estimates, engineers make design and implementation decisions to ensure that task executions always complete before their specified deadlines. However, in practice, engineers often cannot provide precise point WCET estimates and prefer to provide plausible WCET ranges. G… ▽ More

    Submitted 7 June, 2022; v1 submitted 20 July, 2020; originally announced July 2020.

  18. Signal-Based Properties of Cyber-Physical Systems: Taxonomy and Logic-based Characterization

    Authors: Chaima Boufaied, Maris Jukss, Domenico Bianculli, Lionel Claude Briand, Yago Isasi Parache

    Abstract: The behavior of a cyber-physical system (CPS) is usually defined in terms of the input and output signals processed by sensors and actuators. Requirements specifications of CPSs are typically expressed using signal-based temporal properties. Expressing such requirements is challenging, because of (1) the many features that can be used to characterize a signal behavior; (2) the broad variation in e… ▽ More

    Submitted 28 December, 2020; v1 submitted 18 October, 2019; originally announced October 2019.

    Comments: 37 pages, revised version, accepted for publication by the Elsevier Journal of Systems and Software

    Journal ref: Volume 174, April 2021, 110881

  19. arXiv:1910.02837  [pdf, other

    cs.SE

    Approximation-Refinement Testing of Compute-Intensive Cyber-Physical Models: An Approach Based on System Identification

    Authors: Claudio Menghi, Shiva Nejati, Lionel C. Briand, Yago Isasi Parache

    Abstract: Black-box testing has been extensively applied to test models of Cyber-Physical systems (CPS) since these models are not often amenable to static and symbolic testing and verification. Black-box testing, however, requires to execute the model under test for a large number of candidate test inputs. This poses a challenge for a large and practically-important category of CPS models, known as compute… ▽ More

    Submitted 7 October, 2019; originally announced October 2019.

  20. arXiv:1907.08490  [pdf, other

    cs.SE

    Automatic Generation of Acceptance Test Cases from Use Case Specifications: an NLP-based Approach

    Authors: Chunhui Wang, Fabrizio Pastore, Arda Goknil, Lionel C. Briand

    Abstract: Acceptance testing is a validation activity performed to ensure the conformance of software systems with respect to their functional requirements. In safety critical systems, it plays a crucial role since it is enforced by software standards. Test engineers need to identify all the representative test execution scenarios from requirements, determine the runtime conditions that trigger these scenar… ▽ More

    Submitted 18 May, 2020; v1 submitted 19 July, 2019; originally announced July 2019.

  21. Dynamic Adaptation of Software-defined Networks for IoT Systems: A Search-based Approach

    Authors: Seung Yeob Shin, Shiva Nejati, Mehrdad Sabetzadeh, Lionel C. Briand, Chetan Arora, Frank Zimmer

    Abstract: The concept of Internet of Things (IoT) has led to the development of many complex and critical systems such as smart emergency management systems. IoT-enabled applications typically depend on a communication network for transmitting large volumes of data in unpredictable and changing environments. These networks are prone to congestion when there is a burst in demand, e.g., as an emergency situat… ▽ More

    Submitted 15 May, 2020; v1 submitted 29 May, 2019; originally announced May 2019.

    Comments: This paper has been accepted at IEEE/ACM 15th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2020)

  22. arXiv:1905.11699  [pdf, other

    cs.SE

    Automating System Test Case Classification and Prioritization for Use Case-Driven Testing in Product Lines

    Authors: Ines Hajri, Arda Goknil, Fabrizio Pastore, Lionel C. Briand

    Abstract: Product Line Engineering (PLE) is a crucial practice in many software development environments where software systems are complex and developed for multiple customers with varying needs. At the same time, many development processes are use case-driven and this strongly influences their requirements engineering and system testing practices. In this paper, we propose, apply, and assess an automated… ▽ More

    Submitted 17 June, 2020; v1 submitted 28 May, 2019; originally announced May 2019.

  23. arXiv:1905.03490  [pdf, other

    cs.SE

    Evaluating Model Testing and Model Checking for Finding Requirements Violations in Simulink Models

    Authors: Shiva Nejati, Khouloud Gaaloul, Claudio Menghi, Lionel C. Briand, Stephen Foster, David Wolfe

    Abstract: Matlab/Simulink is a development and simulation language that is widely used by the Cyber-Physical System (CPS) industry to model dynamical systems. There are two mainstream approaches to verify CPS Simulink models: model testing that attempts to identify failures in models by executing them for a number of sampled test inputs, and model checking that attempts to exhaustively check the correctness… ▽ More

    Submitted 9 May, 2019; originally announced May 2019.

    Comments: 10 pages + 2 page references

  24. Practical Constraint Solving for Generating System Test Data

    Authors: Ghanem Soltana, Mehrdad Sabetzadeh, Lionel C. Briand

    Abstract: The ability to generate test data is often a necessary prerequisite for automated software testing. For the generated data to be fit for its intended purpose, the data usually has to satisfy various logical constraints. When testing is performed at a system level, these constraints tend to be complex and are typically captured in expressive formalisms based on first-order logic. Motivated by impro… ▽ More

    Submitted 15 May, 2020; v1 submitted 1 February, 2019; originally announced February 2019.

    Comments: Published in ACM Transactions on Software Engineering and Methodology (TOSEM)