Skip to main content

Showing 1–6 of 6 results for author: Sorokin, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.01918  [pdf, other

    cs.SE cs.LG

    Towards Continuous Assurance Case Creation for ADS with the Evidential Tool Bus

    Authors: Lev Sorokin, Radouane Bouchekir, Tewodros A. Beyene, Brian Hsuan-Cheng Liao, Adam Molin

    Abstract: An assurance case has become an integral component for the certification of safety-critical systems. While manually defining assurance case patterns can be not avoided, system-specific instantiations of assurance case patterns are both costly and time-consuming. It becomes especially complex to maintain an assurance case for a system when the requirements of the System-Under-Assurance change, or a… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

    Comments: Accepted at International SafeAutonomy Workshop at EDCC '24

  2. arXiv:2401.12364  [pdf, other

    cs.SE cs.NE

    Guiding the Search Towards Failure-Inducing Test Inputs Using Support Vector Machines

    Authors: Lev Sorokin, Niklas Kerscher

    Abstract: In this paper, we present NSGA-II-SVM (Non-dominated Sorting Genetic Algorithm with Support Vector Machine Guidance), a novel learnable evolutionary and search-based testing algorithm that leverages Support Vector Machine (SVM) classification models to direct the search towards failure-revealing test inputs. Supported by genetic search, NSGA-II-SVM creates iteratively SVM-based models of the test… ▽ More

    Submitted 22 January, 2024; originally announced January 2024.

    Comments: Accepted for DeepTest Workshop at ICSE '24

  3. arXiv:2312.12057  [pdf, other

    cs.SE

    Monitoring Auditable Claims in the Cloud

    Authors: Lev Sorokin, Ulrich Schoepp

    Abstract: When deploying mission-critical systems in the cloud, where deviations may have severe consequences, the assurance of critical decisions becomes essential. Typical cloud systems are operated by third parties and are built on complex software stacks consisting of e.g., Kubernetes, Istio, or Kafka, which due to their size are difficult to be verified. Nevertheless, one needs to make sure that missio… ▽ More

    Submitted 19 December, 2023; originally announced December 2023.

  4. arXiv:2306.10296  [pdf, other

    cs.SE

    OpenSBT: A Modular Framework for Search-based Testing of Automated Driving Systems

    Authors: Lev Sorokin, Tiziano Munaro, Damir Safin, Brian Hsuan-Cheng Liao, Adam Molin

    Abstract: Search-based software testing (SBT) is an effective and efficient approach for testing automated driving systems (ADS). However, testing pipelines for ADS testing are particularly challenging as they involve integrating complex driving simulation platforms and establishing communication protocols and APIs with the desired search algorithm. This complexity prevents a wide adoption of SBT and thorou… ▽ More

    Submitted 2 November, 2023; v1 submitted 17 June, 2023; originally announced June 2023.

  5. arXiv:2305.00083  [pdf, other

    cs.SE

    Reflections on Surrogate-Assisted Search-Based Testing: A Taxonomy and Two Replication Studies based on Industrial ADAS and Simulink Models

    Authors: Shiva Nejati, Lev Sorokin, Damir Safin, Federico Formica, Mohammad Mahdi Mahboob, Claudio Menghi

    Abstract: Surrogate-assisted search-based testing (SA-SBT) aims to reduce the computational time for testing compute-intensive systems. Surrogates enhance testing techniques by improving test case generation focusing the testing budget on the most critical portions of the input domain. In addition, they can serve as approximations of the system under test (SUT) to predict tests' results instead of executing… ▽ More

    Submitted 28 April, 2023; originally announced May 2023.

    Comments: Submitted to the Information and Software Technology Journal

  6. arXiv:2209.14071  [pdf, other

    cs.SE

    Towards Auditable Distributed Systems

    Authors: Lev Sorokin

    Abstract: The emerging trend towards distributed (cloud) systems (DS) has widely arrived whether in the automotive, public or the financial sector, but the execution of services of heterogeneous service providers is exposed to several risks. Beside hardware/software faults or cyber attacks that can influence the correctness of the system, fraud is also an issue. In such case it is not only important to veri… ▽ More

    Submitted 28 September, 2022; originally announced September 2022.

    Comments: Editor: Ibéria Medeiros. 18th European Dependable Computing Conference (EDCC 2022), September 12-15, 2022, Zaragoza, Spain. Student Forum Proceedings - EDCC 2022