Skip to main content

Showing 1–17 of 17 results for author: Păsăreanu, C S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2302.04634  [pdf, other

    cs.CV cs.AI cs.FL cs.LG

    Closed-loop Analysis of Vision-based Autonomous Systems: A Case Study

    Authors: Corina S. Pasareanu, Ravi Mangal, Divya Gopinath, Sinem Getir Yaman, Calum Imrie, Radu Calinescu, Huafeng Yu

    Abstract: Deep neural networks (DNNs) are increasingly used in safety-critical autonomous systems as perception components processing high-dimensional image data. Formal analysis of these systems is particularly challenging due to the complexity of the perception DNNs, the sensors (cameras), and the environment conditions. We present a case study applying formal probabilistic analysis techniques to an exper… ▽ More

    Submitted 6 February, 2023; originally announced February 2023.

  2. arXiv:2208.03407  [pdf, other

    cs.SE cs.AI cs.LG

    An Overview of Structural Coverage Metrics for Testing Neural Networks

    Authors: Muhammad Usman, Youcheng Sun, Divya Gopinath, Rishi Dange, Luca Manolache, Corina S. Pasareanu

    Abstract: Deep neural network (DNN) models, including those used in safety-critical domains, need to be thoroughly tested to ensure that they can reliably perform well in different scenarios. In this article, we provide an overview of structural coverage metrics for testing DNN models, including neuron coverage (NC), k-multisection neuron coverage (kMNC), top-k neuron coverage (TKNC), neuron boundary covera… ▽ More

    Submitted 5 August, 2022; originally announced August 2022.

  3. arXiv:2207.10534  [pdf, other

    cs.FL

    Assume, Guarantee or Repair -- A Regular Framework for Non Regular Properties (full version)

    Authors: Hadar Frenkel, Orna Grumberg, Corina S. Pasareanu, Sarai Sheinvald

    Abstract: We present Assume-Guarantee-Repair (AGR) - a novel framework which verifies that a program satisfies a set of properties and also repairs the program in case the verification fails. We consider communicating programs - these are simple C-like programs, extended with synchronous actions over communication channels. Our method, which consists of a learning-based approach to assume-guarantee reasonin… ▽ More

    Submitted 21 July, 2022; originally announced July 2022.

  4. arXiv:2205.03894  [pdf, ps, other

    cs.CR cs.AI

    VPN: Verification of Poisoning in Neural Networks

    Authors: Youcheng Sun, Muhammad Usman, Divya Gopinath, Corina S. Păsăreanu

    Abstract: Neural networks are successfully used in a variety of applications, many of them having safety and security concerns. As a result researchers have proposed formal verification techniques for verifying neural network properties. While previous efforts have mainly focused on checking local robustness in neural networks, we instead study another neural network security issue, namely data poisoning. I… ▽ More

    Submitted 8 May, 2022; originally announced May 2022.

  5. arXiv:2202.01179  [pdf, other

    cs.CR cs.CV

    AntidoteRT: Run-time Detection and Correction of Poison Attacks on Neural Networks

    Authors: Muhammad Usman, Youcheng Sun, Divya Gopinath, Corina S. Pasareanu

    Abstract: We study backdoor poisoning attacks against image classification networks, whereby an attacker inserts a trigger into a subset of the training data, in such a way that at test time, this trigger causes the classifier to predict some target class. %There are several techniques proposed in the literature that aim to detect the attack but only a few also propose to defend against it, and they typical… ▽ More

    Submitted 31 January, 2022; originally announced February 2022.

  6. arXiv:2110.12588  [pdf, other

    cs.LG cs.AI cs.SE

    QuantifyML: How Good is my Machine Learning Model?

    Authors: Muhammad Usman, Divya Gopinath, Corina S. Păsăreanu

    Abstract: The efficacy of machine learning models is typically determined by computing their accuracy on test data sets. However, this may often be misleading, since the test data may not be representative of the problem that is being studied. With QuantifyML we aim to precisely quantify the extent to which machine learning models have learned and generalized from the given data. Given a trained model, Quan… ▽ More

    Submitted 24 October, 2021; originally announced October 2021.

    Comments: In Proceedings FMAS 2021, arXiv:2110.11527

    Journal ref: EPTCS 348, 2021, pp. 92-100

  7. arXiv:2103.01629  [pdf, other

    cs.LG

    DeepCert: Verification of Contextually Relevant Robustness for Neural Network Image Classifiers

    Authors: Colin Paterson, Haoze Wu, John Grese, Radu Calinescu, Corina S. Pasareanu, Clark Barrett

    Abstract: We introduce DeepCert, a tool-supported method for verifying the robustness of deep neural network (DNN) image classifiers to contextually relevant perturbations such as blur, haze, and changes in image contrast. While the robustness of DNN classifiers has been the subject of intense research in recent years, the solutions delivered by this research focus on verifying DNN robustness to small pertu… ▽ More

    Submitted 2 March, 2021; originally announced March 2021.

  8. arXiv:1904.13215  [pdf, other

    cs.LG cs.AI cs.FL

    Property Inference for Deep Neural Networks

    Authors: Divya Gopinath, Hayes Converse, Corina S. Pasareanu, Ankur Taly

    Abstract: We present techniques for automatically inferring formal properties of feed-forward neural networks. We observe that a significant part (if not all) of the logic of feed forward networks is captured in the activation status ('on' or 'off') of its neurons. We propose to extract patterns based on neuron decisions as preconditions that imply certain desirable output property e.g., the prediction bein… ▽ More

    Submitted 10 September, 2020; v1 submitted 29 April, 2019; originally announced April 2019.

    Comments: Errata: This version updates the ASE'19 conference version by correcting the definition of the three properties that were checked for ACASXU

  9. arXiv:1811.07005  [pdf, other

    cs.CR cs.SE

    DifFuzz: Differential Fuzzing for Side-Channel Analysis

    Authors: Shirin Nilizadeh, Yannic Noller, Corina S. Pasareanu

    Abstract: Side-channel attacks allow an adversary to uncover secret program data by observing the behavior of a program with respect to a resource, such as execution time, consumed memory or response size. Side-channel vulnerabilities are difficult to reason about as they involve analyzing the correlations between resource usage over multiple program paths. We present DifFuzz, a fuzzing-based approach for d… ▽ More

    Submitted 26 February, 2019; v1 submitted 16 November, 2018; originally announced November 2018.

  10. arXiv:1810.08303  [pdf, other

    cs.AI cs.LG

    Compositional Verification for Autonomous Systems with Deep Learning Components

    Authors: Corina S. Pasareanu, Divya Gopinath, Huafeng Yu

    Abstract: As autonomy becomes prevalent in many applications, ranging from recommendation systems to fully autonomous vehicles, there is an increased need to provide safety guarantees for such systems. The problem is difficult, as these are large, complex systems which operate in uncertain environments, requiring data-driven machine-learning components. However, learning techniques such as Deep Neural Netwo… ▽ More

    Submitted 18 October, 2018; originally announced October 2018.

  11. arXiv:1807.10439  [pdf, other

    cs.SE cs.CR

    Symbolic Execution for Deep Neural Networks

    Authors: Divya Gopinath, Kaiyuan Wang, Mengshi Zhang, Corina S. Pasareanu, Sarfraz Khurshid

    Abstract: Deep Neural Networks (DNN) are increasingly used in a variety of applications, many of them with substantial safety and security concerns. This paper introduces DeepCheck, a new approach for validating DNNs based on core ideas from program analysis, specifically from symbolic execution. The idea is to translate a DNN into an imperative program, thereby enabling program analysis to assist with DNN… ▽ More

    Submitted 27 July, 2018; originally announced July 2018.

  12. Badger: Complexity Analysis with Fuzzing and Symbolic Execution

    Authors: Yannic Noller, Rody Kersten, Corina S. Păsăreanu

    Abstract: Hybrid testing approaches that involve fuzz testing and symbolic execution have shown promising results in achieving high code coverage, uncovering subtle errors and vulnerabilities in a variety of software applications. In this paper we describe Badger - a new hybrid approach for complexity analysis, with the goal of discovering vulnerabilities which occur when the worst-case time or space comple… ▽ More

    Submitted 8 June, 2018; originally announced June 2018.

    Journal ref: In Proceedings of 27th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'18). ACM, New York, NY, USA, 11 pages, 2018

  13. arXiv:1710.00486  [pdf, other

    cs.NE cs.LG stat.ML

    DeepSafe: A Data-driven Approach for Checking Adversarial Robustness in Neural Networks

    Authors: Divya Gopinath, Guy Katz, Corina S. Pasareanu, Clark Barrett

    Abstract: Deep neural networks have become widely used, obtaining remarkable results in domains such as computer vision, speech recognition, natural language processing, audio recognition, social network filtering, machine translation, and bio-informatics, where they have produced results comparable to human experts. However, these networks can be easily fooled by adversarial perturbations: minimal changes… ▽ More

    Submitted 30 January, 2020; v1 submitted 2 October, 2017; originally announced October 2017.

  14. Abstraction and Learning for Infinite-State Compositional Verification

    Authors: Dimitra Giannakopoulou, Corina S. Păsăreanu

    Abstract: Despite many advances that enable the application of model checking techniques to the verification of large systems, the state-explosion problem remains the main challenge for scalability. Compositional verification addresses this challenge by decomposing the verification of a large system into the verification of its components. Recent techniques use learning-based approaches to automate composit… ▽ More

    Submitted 19 September, 2013; originally announced September 2013.

    Comments: In Proceedings Festschrift for Dave Schmidt, arXiv:1309.4557

    Journal ref: EPTCS 129, 2013, pp. 211-228

  15. Learning Probabilistic Systems from Tree Samples

    Authors: Anvesh Komuravelli, Corina S. Pasareanu, Edmund M. Clarke

    Abstract: We consider the problem of learning a non-deterministic probabilistic system consistent with a given finite set of positive and negative tree samples. Consistency is defined with respect to strong simulation conformance. We propose learning algorithms that use traditional and a new "stochastic" state-space partitioning, the latter resulting in the minimum number of states. We then use them to solv… ▽ More

    Submitted 20 July, 2012; originally announced July 2012.

    Comments: 14 pages, conference paper with full proofs

    Journal ref: LICS, pp. 441-450, IEEE, 2012

  16. Assume-Guarantee Abstraction Refinement for Probabilistic Systems

    Authors: Anvesh Komuravelli, Corina S. Pasareanu, Edmund M. Clarke

    Abstract: We describe an automated technique for assume-guarantee style checking of strong simulation between a system and a specification, both expressed as non-deterministic Labeled Probabilistic Transition Systems (LPTSes). We first characterize counterexamples to strong simulation as "stochastic" trees and show that simpler structures are insufficient. Then, we use these trees in an abstraction refineme… ▽ More

    Submitted 20 July, 2012; originally announced July 2012.

    Comments: 23 pages, conference paper with full proofs

    Journal ref: CAV, vol. 7358 of LNCS, pp. 310-326. Springer-Verlag. 2012

  17. Predicate Abstraction with Under-approximation Refinement

    Authors: Corina S. Pasareanu, Radek Pelanek, Willem Visser

    Abstract: We propose an abstraction-based model checking method which relies on refinement of an under-approximation of the feasible behaviors of the system under analysis. The method preserves errors to safety properties, since all analyzed behaviors are feasible by definition. The method does not require an abstract transition relation to be generated, but instead executes the concrete transitions while… ▽ More

    Submitted 26 February, 2007; v1 submitted 22 January, 2007; originally announced January 2007.

    Comments: 22 pages, 3 figures, accepted for publication in Logical Methods in Computer Science journal (special issue CAV 2005)

    ACM Class: D.2.4; F.3.1

    Journal ref: Logical Methods in Computer Science, Volume 3, Issue 1 (February 26, 2007) lmcs:2227