Skip to main content

Showing 1–6 of 6 results for author: Teuber, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.10998  [pdf, other

    eess.SY cs.AI cs.LG cs.LO

    Provably Safe Neural Network Controllers via Differential Dynamic Logic

    Authors: Samuel Teuber, Stefan Mitsch, André Platzer

    Abstract: While neural networks (NNs) have potential as autonomous controllers for Cyber-Physical Systems, verifying the safety of NN based control systems (NNCSs) poses significant challenges for the practical use of NNs, especially when safety is needed for unbounded time horizons. One reason is the intractability of analyzing NNs, ODEs and hybrid systems. To this end, we introduce VerSAILLE (Verifiably S… ▽ More

    Submitted 14 June, 2024; v1 submitted 16 February, 2024; originally announced February 2024.

    Comments: 35 pages (main paper has 9 pages), 12 figures

  2. Quantifying Software Correctness by Combining Architecture Modeling and Formal Program Analysis

    Authors: Florian Lanzinger, Christian Martin, Frederik Reiche, Samuel Teuber, Robert Heinrich, Alexander Weigl

    Abstract: Most formal methods see the correctness of a software system as a binary decision. However, proving the correctness of complex systems completely is difficult because they are composed of multiple components, usage scenarios, and environments. We present QuAC, a modular approach for quantifying the correctness of service-oriented software systems by combining software architecture modeling with de… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

    Comments: 10 pages; to appear at the 39th ACM/SIGAPP Symposium on Applied Computing (SAC '24)

  3. arXiv:2312.10128  [pdf, ps, other

    cs.CR cs.AI cs.CY cs.LG cs.LO

    An Information-Flow Perspective on Algorithmic Fairness

    Authors: Samuel Teuber, Bernhard Beckert

    Abstract: This work presents insights gained by investigating the relationship between algorithmic fairness and the concept of secure information flow. The problem of enforcing secure information flow is well-studied in the context of information security: If secret information may "flow" through an algorithm or program in such a way that it can influence the program's output, then that is considered insecu… ▽ More

    Submitted 15 December, 2023; originally announced December 2023.

    Comments: 14 pages; extended version of paper to appear at AAAI 2024

  4. arXiv:2112.06582  [pdf, other

    cs.LG cs.AI cs.CC cs.LO

    Geometric Path Enumeration for Equivalence Verification of Neural Networks

    Authors: Samuel Teuber, Marko Kleine Büning, Philipp Kern, Carsten Sinz

    Abstract: As neural networks (NNs) are increasingly introduced into safety-critical domains, there is a growing need to formally verify NNs before deployment. In this work we focus on the formal verification problem of NN equivalence which aims to prove that two NNs (e.g. an original and a compressed version) show equivalent behavior. Two approaches have been proposed for this problem: Mixed integer linear… ▽ More

    Submitted 13 December, 2021; originally announced December 2021.

    Comments: Paper presented at The 33rd IEEE International Conference on Tools with Artificial Intelligence (ICTAI)

    Journal ref: 2021 IEEE 33rd International Conference on Tools with Artificial Intelligence (ICTAI)

  5. arXiv:2008.10061  [pdf, other

    cs.LO

    An Incremental Abstraction Scheme for Solving Hard SMT-Instances over Bit-Vectors

    Authors: Samuel Teuber, Marko Kleine Büning, Carsten Sinz

    Abstract: Decision procedures for SMT problems based on the theory of bit-vectors are a fundamental component in state-of-the-art software and hardware verifiers. While very efficient in general, certain SMT instances are still challenging for state-of-the-art solvers (especially when such instances include computationally costly functions). In this work, we present an approach for the quantifier-free bit-v… ▽ More

    Submitted 23 August, 2020; originally announced August 2020.

  6. A Question of Context: Enhancing Intrusion Detection by Providing Context Information

    Authors: Simon Duque Anton, Daniel Fraunholz, Stephan Teuber, Hans Dieter Schotten

    Abstract: Due to the fourth industrial revolution, and the resulting increase in interconnectivity, industrial networks are more and more opened to publicly available networks. Apart from the huge benefit in manageability and flexibility, the openness also results in a larger attack surface for malicious adversaries. In comparison to office environments, industrial networks have very high volumes of data. I… ▽ More

    Submitted 28 May, 2019; originally announced May 2019.

    Comments: This is a preprint of a work published at the 2017 Internet of Things Business Models, Users, and Networks