Skip to main content

Showing 1–9 of 9 results for author: Carr, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2311.01258  [pdf, other

    cs.AI cs.LO eess.SY

    Formal Methods for Autonomous Systems

    Authors: Tichakorn Wongpiromsarn, Mahsa Ghasemi, Murat Cubuktepe, Georgios Bakirtzis, Steven Carr, Mustafa O. Karabag, Cyrus Neary, Parham Gohari, Ufuk Topcu

    Abstract: Formal methods refer to rigorous, mathematical approaches to system development and have played a key role in establishing the correctness of safety-critical systems. The main building blocks of formal methods are models and specifications, which are analogous to behaviors and requirements in system design and give us the means to verify and synthesize system behaviors with formal guarantees. Th… ▽ More

    Submitted 2 November, 2023; originally announced November 2023.

  2. arXiv:2310.18239  [pdf, other

    cs.AI cs.CL cs.FL cs.RO

    Fine-Tuning Language Models Using Formal Methods Feedback

    Authors: Yunhao Yang, Neel P. Bhatt, Tyler Ingebrand, William Ward, Steven Carr, Zhangyang Wang, Ufuk Topcu

    Abstract: Although pre-trained language models encode generic knowledge beneficial for planning and control, they may fail to generate appropriate control policies for domain-specific tasks. Existing fine-tuning methods use human feedback to address this limitation, however, sourcing human feedback is labor intensive and costly. We present a fully automated approach to fine-tune pre-trained language models… ▽ More

    Submitted 27 October, 2023; originally announced October 2023.

  3. arXiv:2204.00755  [pdf, other

    cs.AI

    Safe Reinforcement Learning via Shielding under Partial Observability

    Authors: Steven Carr, Nils Jansen, Sebastian Junges, Ufuk Topcu

    Abstract: Safe exploration is a common problem in reinforcement learning (RL) that aims to prevent agents from making disastrous decisions while exploring their environment. A family of approaches to this problem assume domain knowledge in the form of a (partial) model of this environment to decide upon the safety of an action. A so-called shield forces the RL agent to select only safe actions. However, for… ▽ More

    Submitted 22 August, 2022; v1 submitted 1 April, 2022; originally announced April 2022.

    Comments: 21 pages, 28 Figures, 3 Tables

  4. arXiv:2203.10950  [pdf, other

    cs.RO cs.LO cs.MA eess.SY

    Dynamic Certification for Autonomous Systems

    Authors: Georgios Bakirtzis, Steven Carr, David Danks, Ufuk Topcu

    Abstract: Autonomous systems are often deployed in complex sociotechnical environments, such as public roads, where they must behave safely and securely. Unlike many traditionally engineered systems, autonomous systems are expected to behave predictably in varying "open world" environmental contexts that cannot be fully specified formally. As a result, assurance about autonomous systems requires us to devel… ▽ More

    Submitted 25 April, 2023; v1 submitted 21 March, 2022; originally announced March 2022.

  5. arXiv:2002.05615  [pdf, ps, other

    cs.AI

    Verifiable RNN-Based Policies for POMDPs Under Temporal Logic Constraints

    Authors: Steven Carr, Nils Jansen, Ufuk Topcu

    Abstract: Recurrent neural networks (RNNs) have emerged as an effective representation of control policies in sequential decision-making problems. However, a major drawback in the application of RNN-based policies is the difficulty in providing formal guarantees on the satisfaction of behavioral specifications, e.g. safety and/or reachability. By integrating techniques from formal methods and machine learni… ▽ More

    Submitted 13 February, 2020; originally announced February 2020.

    Comments: 8 pages, 5 figures, 1 table

  6. arXiv:1903.08428  [pdf, ps, other

    cs.AI cs.LG

    Counterexample-Guided Strategy Improvement for POMDPs Using Recurrent Neural Networks

    Authors: Steven Carr, Nils Jansen, Ralf Wimmer, Alexandru C. Serban, Bernd Becker, Ufuk Topcu

    Abstract: We study strategy synthesis for partially observable Markov decision processes (POMDPs). The particular problem is to determine strategies that provably adhere to (probabilistic) temporal logic constraints. This problem is computationally intractable and theoretically hard. We propose a novel method that combines techniques from machine learning and formal verification. First, we train a recurrent… ▽ More

    Submitted 21 March, 2019; v1 submitted 20 March, 2019; originally announced March 2019.

  7. arXiv:1802.09810  [pdf, other

    cs.AI

    Human-in-the-Loop Synthesis for Partially Observable Markov Decision Processes

    Authors: Steven Carr, Nils Jansen, Ralf Wimmer, Jie Fu, Ufuk Topcu

    Abstract: We study planning problems where autonomous agents operate inside environments that are subject to uncertainties and not fully observable. Partially observable Markov decision processes (POMDPs) are a natural formal model to capture such problems. Because of the potentially huge or even infinite belief space in POMDPs, synthesis with safety guarantees is, in general, computationally intractable. W… ▽ More

    Submitted 27 February, 2018; originally announced February 2018.

  8. CUP: Comprehensive User-Space Protection for C/C++

    Authors: Nathan Burow, Derrick McKee, Scott A. Carr, Mathias Payer

    Abstract: Memory corruption vulnerabilities in C/C++ applications enable attackers to execute code, change data, and leak information. Current memory sanitizers do no provide comprehensive coverage of a program's data. In particular, existing tools focus primarily on heap allocations with limited support for stack allocations and globals. Additionally, existing tools focus on the main executable with limite… ▽ More

    Submitted 17 April, 2017; originally announced April 2017.

  9. Control-Flow Integrity: Precision, Security, and Performance

    Authors: Nathan Burow, Scott A. Carr, Joseph Nash, Per Larsen, Michael Franz, Stefan Brunthaler, Mathias Payer

    Abstract: Memory corruption errors in C/C++ programs remain the most common source of security vulnerabilities in today's systems. Control-flow hijacking attacks exploit memory corruption vulnerabilities to divert program execution away from the intended control flow. Researchers have spent more than a decade studying and refining defenses based on Control-Flow Integrity (CFI), and this technique is now int… ▽ More

    Submitted 27 January, 2017; v1 submitted 12 February, 2016; originally announced February 2016.

    Comments: Version submitted to ACM CSUR 01/27/17