Skip to main content

Showing 1–25 of 25 results for author: Ničković, D

.
  1. arXiv:2406.14374  [pdf, other

    cs.FL

    Information-flow Interfaces and Security Lattices

    Authors: Ezio Bartocci, Thomas A. Henzinger, Dejan Nickovic, Ana Oliveira da Costa

    Abstract: Information-flow interfaces is a formalism recently proposed for specifying, composing, and refining system-wide security requirements. In this work, we show how the widely used concept of security lattices provides a natural semantic interpretation for information-flow interfaces.

    Submitted 20 June, 2024; originally announced June 2024.

  2. arXiv:2405.14400  [pdf, other

    cs.LO

    Verifying Global Two-Safety Properties in Neural Networks with Confidence

    Authors: Anagha Athavale, Ezio Bartocci, Maria Christakis, Matteo Maffei, Dejan Nickovic, Georg Weissenbacher

    Abstract: We present the first automated verification technique for confidence-based 2-safety properties, such as global robustness and global fairness, in deep neural networks (DNNs). Our approach combines self-composition to leverage existing reachability analysis techniques and a novel abstraction of the softmax function, which is amenable to automated verification. We characterize and prove the soundnes… ▽ More

    Submitted 17 June, 2024; v1 submitted 23 May, 2024; originally announced May 2024.

    Comments: Accepted at the 36th International Conference on Computer Aided Verification, 2024

  3. arXiv:2403.17805  [pdf, other

    cs.RO cs.LG cs.MA

    Scenario-Based Curriculum Generation for Multi-Agent Autonomous Driving

    Authors: Axel Brunnbauer, Luigi Berducci, Peter Priller, Dejan Nickovic, Radu Grosu

    Abstract: The automated generation of diverse and complex training scenarios has been an important ingredient in many complex learning tasks. Especially in real-world application domains, such as autonomous driving, auto-curriculum generation is considered vital for obtaining robust and general policies. However, crafting traffic scenarios with multiple, heterogeneous agents is typically considered as a ted… ▽ More

    Submitted 26 March, 2024; originally announced March 2024.

    Comments: 7 Pages, Under Review

  4. Hypernode Automata

    Authors: Ezio Bartocci, Thomas A. Henzinger, Dejan Nickovic, Ana Oliveira da Costa

    Abstract: We introduce hypernode automata as a new specification formalism for hyperproperties of concurrent systems. They are finite automata with nodes labeled with hypernode logic formulas and transitions labeled with actions. A hypernode logic formula specifies relations between sequences of variable values in different system executions. Unlike HyperLTL, hypernode logic takes an asynchronous view on ex… ▽ More

    Submitted 8 January, 2024; v1 submitted 4 May, 2023; originally announced May 2023.

    MSC Class: 68Q45 ACM Class: F.4.1

  5. Specification-Guided Critical Scenario Identification for Automated Driving

    Authors: Adam Molin, Edgar A. Aguilar, Dejan Ničković, Mengjia Zhu, Alberto Bemporad, Hasan Esen

    Abstract: To test automated driving systems, we present a case study for finding critical scenarios in driving environments guided by formal specifications. To that aim, we devise a framework for critical scenario identification, which we base on open-source libraries that combine scenario specification, testing, formal methods, and optimization.

    Submitted 9 March, 2023; originally announced March 2023.

    Journal ref: Formal Methods. FM 2023. Lecture Notes in Computer Science, vol 14000

  6. A Systematic Approach to Automotive Security

    Authors: Masoud Ebrahimi, Stefan Marksteiner, Dejan Ničković, Roderick Bloem, David Schögler, Philipp Eisner, Samuel Sprung, Thomas Schober, Sebastian Chlup, Christoph Schmittner, Sandra König

    Abstract: We propose a holistic methodology for designing automotivesystems that consider security a central concern at every design stage.During the concept design, we model the system architecture and definethe security attributes of its components. We perform threat analysis onthe system model to identify structural security issues. From that analysis,we derive attack trees that define recipes describing… ▽ More

    Submitted 17 April, 2023; v1 submitted 6 March, 2023; originally announced March 2023.

    Comments: Presented at Formal Methods 2023 25th International Symposium (FM'23). 12 pages, 5 figures

    Journal ref: In: Chechik, M., Katoen, JP., Leucker, M. (eds) Formal Methods. FM 2023. Lecture Notes in Computer Science, vol 14000. Springer, Cham

  7. arXiv:2301.13615  [pdf, other

    cs.SE

    Property-Based Mutation Testing

    Authors: Ezio Bartocci, Leonardo Mariani, Dejan Nickovic, Drishti Yadav

    Abstract: Mutation testing is an established software quality assurance technique for the assessment of test suites. While it is well-suited to estimate the general fault-revealing capability of a test suite, it is not practical and informative when the software under test must be validated against specific requirements. This is often the case for embedded software, where the software is typically validated… ▽ More

    Submitted 31 January, 2023; originally announced January 2023.

    Comments: Accepted at the 16th IEEE International Conference on Software Testing, Verification and Validation (ICST) 2023

  8. arXiv:2210.03207  [pdf, other

    cs.CR cs.FL cs.LO

    Threat Repair with Optimization Modulo Theories

    Authors: Thorsten Tarrach, Masoud Ebrahimi, Sandra König, Christoph Schmittner, Roderick Bloem, Dejan Nickovic

    Abstract: We propose a model-based procedure for automatically preventing security threats using formal models. We encode system models and potential threats as satisfiability modulo theory (SMT) formulas. This model allows us to ask security questions as satisfiability queries. We formulate threat prevention as an optimization problem over the same formulas. The outcome of our threat prevention procedure i… ▽ More

    Submitted 6 October, 2022; originally announced October 2022.

  9. arXiv:2202.02404  [pdf, other

    cs.AI cs.LO cs.RO

    Model-Free Reinforcement Learning for Symbolic Automata-encoded Objectives

    Authors: Anand Balakrishnan, Stefan Jakšić, Edgar A. Aguilar, Dejan Ničković, Jyotirmoy V. Deshmukh

    Abstract: Reinforcement learning (RL) is a popular approach for robotic path planning in uncertain environments. However, the control policies trained for an RL agent crucially depend on user-defined, state-based reward functions. Poorly designed rewards can lead to policies that do get maximal rewards but fail to satisfy desired task objectives or are unsafe. There are several examples of the use of formal… ▽ More

    Submitted 24 February, 2022; v1 submitted 4 February, 2022; originally announced February 2022.

  10. arXiv:2110.02792  [pdf, other

    cs.LG cs.AI

    Hierarchical Potential-based Reward Sha** from Task Specifications

    Authors: Luigi Berducci, Edgar A. Aguilar, Dejan Ničković, Radu Grosu

    Abstract: The automatic synthesis of policies for robotic-control tasks through reinforcement learning relies on a reward signal that simultaneously captures many possibly conflicting requirements. In this paper, we in\-tro\-duce a novel, hierarchical, potential-based reward-sha** approach (HPRS) for defining effective, multivariate rewards for a large family of such control tasks. We formalize a task as… ▽ More

    Submitted 3 October, 2022; v1 submitted 6 October, 2021; originally announced October 2021.

    Comments: 7 pages main, 5 pages appendix - added f1tenth racing car environment

  11. arXiv:2109.11999  [pdf, other

    cs.SE

    Mining Shape Expressions with ShapeIt

    Authors: Ezio Bartocci, Jyotirmoy Deshmukh, Cristinel Mateis, Eleonora Nesterini, Dejan Nickovic, Xin Qin

    Abstract: We present ShapeIt, a tool for mining specifications of cyber-physical systems (CPS) from their real-valued behaviors. The learned specifications are in the form of linear shape expressions, a declarative formal specification language suitable to express behavioral properties over real-valued signals. A linear shape expression is a regular expression composed of parameterized lines as atomic symbo… ▽ More

    Submitted 2 November, 2021; v1 submitted 24 September, 2021; originally announced September 2021.

  12. arXiv:2109.10294  [pdf, other

    cs.CL cs.SE

    DeepSTL -- From English Requirements to Signal Temporal Logic

    Authors: Jie He, Ezio Bartocci, Dejan Ničković, Haris Isakovic, Radu Grosu

    Abstract: Formal methods provide very powerful tools and techniques for the design and analysis of complex systems. Their practical application remains however limited, due to the widely accepted belief that formal methods require extensive expertise and a steep learning curve. Writing correct formal specifications in form of logical formulas is still considered to be a difficult and error prone task. In… ▽ More

    Submitted 24 March, 2022; v1 submitted 21 September, 2021; originally announced September 2021.

    Comments: 13 pages

  13. arXiv:2106.11041  [pdf, other

    cs.CY cs.FL

    Sampling of Shape Expressions

    Authors: Nicolas Basset, Thao Dang, Felix Gigler, Cristinel Mateis, Dejan Nickovic

    Abstract: Cyber-physical systems (CPS) are increasingly becoming driven by data, using multiple types of sensors to capture huge amounts of data. Extraction and characterization of useful information from big streams of data is a challenging problem. Shape expressions facilitate formal specification of rich temporal patterns encountered in time series as well as in behaviors of CPS. In this paper, we introd… ▽ More

    Submitted 28 May, 2021; originally announced June 2021.

  14. arXiv:2105.02013  [pdf, other

    cs.LO

    Flavours of Sequential Information Flow

    Authors: Ezio Bartocci, Thomas Ferrère, Thomas A. Henzinger, Dejan Nickovic, Ana Oliveira da Costa

    Abstract: Information-flow policies prescribe which information is available to a given user or subsystem. We study the problem of specifying such properties in reactive systems, which may require dynamic changes in information-flow restrictions between their states. We formalize several flavours of sequential information-flow, which cover different assumptions about the semantic relation between multiple o… ▽ More

    Submitted 5 May, 2021; originally announced May 2021.

    ACM Class: F.4.1

  15. arXiv:2103.03544  [pdf

    cs.AI cs.CY

    Challenges of engineering safe and secure highly automated vehicles

    Authors: Nadja Marko, Eike Möhlmann, Dejan Ničković, Jürgen Niehaus, Peter Priller, Martijn Rooker

    Abstract: After more than a decade of intense focus on automated vehicles, we are still facing huge challenges for the vision of fully autonomous driving to become a reality. The same "disillusionment" is true in many other domains, in which autonomous Cyber-Physical Systems (CPS) could considerably help to overcome societal challenges and be highly beneficial to society and individuals. Taking the automoti… ▽ More

    Submitted 10 March, 2021; v1 submitted 5 March, 2021; originally announced March 2021.

    Comments: 13 pages, 2 figures

  16. arXiv:2010.06674  [pdf, other

    cs.SE cs.FL cs.GT cs.LO eess.SY

    Adaptive Testing for Specification Coverage

    Authors: Ezio Bartocci, Roderick Bloem, Benedikt Maderbacher, Niveditha Manjunath, Dejan Ničković

    Abstract: Ensuring correctness of cyber-physical systems (CPS) is an extremely challenging task that is in practice often addressed with simulation based testing. Formal specification languages, such as Signal Temporal Logic (STL), are used to mathematically express CPS requirements and thus render the simulation activity more systematic and principled. We propose a novel method for adaptive generation of t… ▽ More

    Submitted 26 January, 2021; v1 submitted 13 October, 2020; originally announced October 2020.

  17. arXiv:2005.11827  [pdf, other

    cs.LO cs.FL

    RTAMT: Online Robustness Monitors from STL

    Authors: Dejan Nickovic, Tomoya Yamaguchi

    Abstract: We present RTAMT, an online monitoring library for Signal Temporal Logic (STL) and its interface-aware variant (IA-STL), providing both discrete- and dense-time interpretation of the logic. We also introduce RTAMT4ROS, a tool that integrates RTAMT with Robotic Operating System (ROS), a common environment for develo** robotic applications. We evaluate RTAMT and RTAMT4ROS on two robotic case studi… ▽ More

    Submitted 24 May, 2020; originally announced May 2020.

  18. arXiv:2002.06465  [pdf, other

    cs.FL cs.LO

    Information-Flow Interfaces

    Authors: Ezio Bartocci, Thomas Ferrère, Thomas A. Henzinger, Dejan Nickovic, Ana Oliveira da Costa

    Abstract: Contract-based design is a promising methodology for taming the complexity of develo** sophisticated systems. A formal contract distinguishes between assumptions, which are constraints that the designer of a component puts on the environments in which the component can be used safely, and guarantees, which are promises that the designer asks from the team that implements the component. A theory… ▽ More

    Submitted 7 May, 2020; v1 submitted 15 February, 2020; originally announced February 2020.

  19. arXiv:1904.07083  [pdf, other

    cs.SE

    Compositional Specifications for ioco Testing

    Authors: Przemyslaw Daca, Thomas A. Henzinger, Willibald Krenn, Dejan Nickovic

    Abstract: Model-based testing is a promising technology for black-box software and hardware testing, in which test cases are generated automatically from high-level specifications. Nowadays, systems typically consist of multiple interacting components and, due to their complexity, testing presents a considerable portion of the effort and cost in the design process. Exploiting the compositional structure of… ▽ More

    Submitted 15 April, 2019; originally announced April 2019.

  20. arXiv:1903.12468  [pdf, other

    cs.SE cs.LO

    Automatic Failure Explanation in CPS Models

    Authors: Ezio Bartocci, Niveditha Manjunath, Leonardo Mariani, Cristinel Mateis, Dejan Ničković

    Abstract: Debugging Cyber-Physical System (CPS) models can be extremely complex. Indeed, only the detection of a failure is insuffcient to know how to correct a faulty model. Faults can propagate in time and in space producing observable misbehaviours in locations completely different from the location of the fault. Understanding the reason of an observed failure is typically a challenging and laborious tas… ▽ More

    Submitted 29 March, 2019; originally announced March 2019.

  21. arXiv:1811.06740  [pdf, ps, other

    cs.SE

    A Survey of Challenges for Runtime Verification from Advanced Application Domains (Beyond Software)

    Authors: César Sánchez, Gerardo Schneider, Wolfgang Ahrendt, Ezio Bartocci, Domenico Bianculli, Christian Colombo, Yliés Falcone, Adrian Francalanza, Srđan Krstić, JoHao M. Lourenço, Dejan Nickovic, Gordon J. Pace, Jose Rufino, Julien Signoles, Dmitriy Traytel, Alexander Weiss

    Abstract: Runtime verification is an area of formal methods that studies the dynamic analysis of execution traces against formal specifications. Typically, the two main activities in runtime verification efforts are the process of creating monitors from specifications, and the algorithms for the evaluation of traces against the generated monitors. Other activities involve the instrumentation of the system t… ▽ More

    Submitted 16 November, 2018; originally announced November 2018.

  22. arXiv:1804.03237  [pdf, ps, other

    cs.LO cs.FL

    A Counting Semantics for Monitoring LTL Specifications over Finite Traces

    Authors: Ezio Bartocci, Roderick Bloem, Dejan Nickovic, Franz Roeck

    Abstract: We consider the problem of monitoring a Linear Time Logic (LTL) specification that is defined on infinite paths, over finite traces. For example, we may need to draw a verdict on whether the system satisfies or violates the property "p holds infinitely often." The problem is that there is always a continuation of a finite trace that satisfies the property and a different continuation that violates… ▽ More

    Submitted 9 April, 2018; originally announced April 2018.

  23. arXiv:1802.03775  [pdf, other

    cs.LO

    An Algebraic Framework for Runtime Verification

    Authors: Stefan Jaksic, Ezio Bartocci, Radu Grosu, Dejan Nickovic

    Abstract: Runtime verification (RV) is a pragmatic and scalable, yet rigorous technique, to assess the correctness of complex systems, including cyber-physical systems (CPS). By measuring how robustly a CPS run satisfies a specification, RV allows in addition, to quantify the resiliency of a CPS to perturbations. In this paper we propose Algebraic Runtime Verification (ARV), a general, semantic framework fo… ▽ More

    Submitted 11 February, 2018; originally announced February 2018.

  24. Temporal Logic as Filtering

    Authors: Alena Rodionova, Ezio Bartocci, Dejan Nickovic, Radu Grosu

    Abstract: We show that metric temporal logic can be viewed as linear time-invariant filtering, by interpreting addition, multiplication, and their neutral elements, over the (max,min,0,1) idempotent dioid. Moreover, by interpreting these operators over the field of reals (+,*,0,1), one can associate various quantitative semantics to a metric-temporal-logic formula, depending on the filter's kernel used: squ… ▽ More

    Submitted 9 February, 2016; v1 submitted 27 October, 2015; originally announced October 2015.

    Comments: 10 pages

    MSC Class: 03B44 ACM Class: F.4.1; D.3.1

    Journal ref: HSCC 2016, April 12 - 14, 2016, Vienna, Austria

  25. arXiv:1508.03575  [pdf, other

    cs.FL

    Bounded Determinization of Timed Automata with Silent Transitions

    Authors: Florian Lorber, Amnon Rosenmann, Dejan Nickovic, Bernhard Aichernig

    Abstract: Deterministic timed automata are strictly less expressive than their non-deterministic counterparts, which are again less expressive than those with silent transitions. As a consequence, timed automata are in general non-determinizable. This is unfortunate since deterministic automata play a major role in model-based testing, observability and implementability. However, by bounding the length of t… ▽ More

    Submitted 14 August, 2015; originally announced August 2015.

    Comments: 25 pages