Skip to main content

Showing 1–23 of 23 results for author: Nuzzo, P

Searching in archive eess. Search in all archives.
.
  1. arXiv:2407.02083  [pdf, other

    math.DS eess.SY math.OC

    Passivity Tools for Hybrid Learning Rules in Large Populations

    Authors: Jair Certorio, Nuno C. Martins, Kevin Chang, Pierluigi Nuzzo, Yasser Shoukry

    Abstract: Recent work has pioneered the use of system-theoretic passivity to study equilibrium stability for the dynamics of noncooperative strategic interactions in large populations of learning agents. In this and related works, the stability analysis leverages knowledge that certain ``canonical'' classes of learning rules used to model the agents' strategic behaviors satisfy a passivity condition known a… ▽ More

    Submitted 2 July, 2024; originally announced July 2024.

    Comments: 12 pages, 3 figures

    MSC Class: 92D10; 92D25

  2. arXiv:2403.01789  [pdf, other

    cs.CR eess.SY

    DECOR: Enhancing Logic Locking Against Machine Learning-Based Attacks

    Authors: Yinghua Hu, Kaixin Yang, Subhajit Dutta Chowdhury, Pierluigi Nuzzo

    Abstract: Logic locking (LL) has gained attention as a promising intellectual property protection measure for integrated circuits. However, recent attacks, facilitated by machine learning (ML), have shown the potential to predict the correct key in multiple LL schemes by exploiting the correlation of the correct key value with the circuit structure. This paper presents a generic LL enhancement method based… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

    Comments: 8 pages. Accepted at the International Symposium on Quality Electronic Design (ISQED), 2024

  3. arXiv:2310.10107  [pdf, other

    cs.LG cs.AI eess.SY stat.ML

    Posterior Sampling-based Online Learning for Episodic POMDPs

    Authors: Dengwang Tang, Dongze Ye, Rahul Jain, Ashutosh Nayyar, Pierluigi Nuzzo

    Abstract: Learning in POMDPs is known to be significantly harder than MDPs. In this paper, we consider the online learning problem for episodic POMDPs with unknown transition and observation models. We propose a Posterior Sampling-based reinforcement learning algorithm for POMDPs (PS4POMDPs), which is much simpler and more implementable compared to state-of-the-art optimism-based online learning algorithms… ▽ More

    Submitted 23 May, 2024; v1 submitted 16 October, 2023; originally announced October 2023.

    Comments: 32 pages, 4 figures

    MSC Class: 93E35

  4. arXiv:2305.14736  [pdf, other

    cs.AI cs.FL eess.SY

    Optimal Control of Logically Constrained Partially Observable and Multi-Agent Markov Decision Processes

    Authors: Krishna C. Kalagarla, Dhruva Kartik, Dongming Shen, Rahul Jain, Ashutosh Nayyar, Pierluigi Nuzzo

    Abstract: Autonomous systems often have logical constraints arising, for example, from safety, operational, or regulatory requirements. Such constraints can be expressed using temporal logic specifications. The system state is often partially observable. Moreover, it could encompass a team of multiple agents with a common objective but disparate information structures and constraints. In this paper, we firs… ▽ More

    Submitted 19 June, 2024; v1 submitted 24 May, 2023; originally announced May 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2203.09038

  5. arXiv:2305.00107  [pdf, other

    cs.CR eess.SY

    Unraveling Latch Locking Using Machine Learning, Boolean Analysis, and ILP

    Authors: Dake Chen, Xuan Zhou, Yinghua Hu, Yuke Zhang, Kaixin Yang, Andrew Rittenbach, Pierluigi Nuzzo, Peter A. Beerel

    Abstract: Logic locking has become a promising approach to provide hardware security in the face of a possibly insecure fabrication supply chain. While many techniques have focused on locking combinational logic (CL), an alternative latch-locking approach in which the sequential elements are locked has also gained significant attention. Latch (LAT) locking duplicates a subset of the flip-flops (FF) of a des… ▽ More

    Submitted 28 April, 2023; originally announced May 2023.

    Comments: 8 pages, 7 figures, accepted by ISQED 2023

    ACM Class: B.m; C.m

  6. arXiv:2304.06049  [pdf, other

    cs.LG eess.SY

    Exact and Cost-Effective Automated Transformation of Neural Network Controllers to Decision Tree Controllers

    Authors: Kevin Chang, Nathan Dahlin, Rahul Jain, Pierluigi Nuzzo

    Abstract: Over the past decade, neural network (NN)-based controllers have demonstrated remarkable efficacy in a variety of decision-making tasks. However, their black-box nature and the risk of unexpected behaviors and surprising results pose a challenge to their deployment in real-world systems with strong guarantees of correctness and safety. We address these limitations by investigating the transformati… ▽ More

    Submitted 15 September, 2023; v1 submitted 11 April, 2023; originally announced April 2023.

  7. arXiv:2303.01448  [pdf, other

    eess.SY

    Co-Design of Topology, Scheduling, and Path Planning in Automated Warehouses

    Authors: Christopher Leet, Chanwook Oh, Michele Lora, Sven Koenig, Pierluigi Nuzzo

    Abstract: We address the warehouse servicing problem (WSP) in automated warehouses, which use teams of mobile agents to bring products from shelves to packing stations. Given a list of products, the WSP amounts to finding a plan for a team of agents which brings every product on the list to a station within a given timeframe. The WSP consists of four subproblems, concerning what tasks to perform (task formu… ▽ More

    Submitted 2 March, 2023; originally announced March 2023.

    Comments: To be published in Design, Automation and Test in Europe Conference (DATE) 2023

  8. arXiv:2301.11547  [pdf, other

    cs.LG cs.AI eess.SY

    Safe Posterior Sampling for Constrained MDPs with Bounded Constraint Violation

    Authors: Krishna C Kalagarla, Rahul Jain, Pierluigi Nuzzo

    Abstract: Constrained Markov decision processes (CMDPs) model scenarios of sequential decision making with multiple objectives that are increasingly important in many applications. However, the model is often unknown and must be learned online while still ensuring the constraint is met, or at least the violation is bounded with time. Some recent papers have made progress on this very challenging problem but… ▽ More

    Submitted 27 January, 2023; originally announced January 2023.

  9. arXiv:2209.07478  [pdf, other

    eess.SY

    Control Barrier Function Contracts for Vehicular Mission Planning Under Signal Temporal Logic Specifications

    Authors: Muhammad Waqas, Nikhil Vijay Naik, Petros Ioannou, Pierluigi Nuzzo

    Abstract: We present a compositional control synthesis method based on assume-guarantee contracts with application to correct-by-construction design of vehicular mission plans. In our approach, a mission-level specification expressed in a fragment of signal temporal logic (STL) is decomposed into predicates defined on non-overlap** time intervals. The STL predicates are then mapped to an aggregation of co… ▽ More

    Submitted 20 September, 2022; v1 submitted 15 September, 2022; originally announced September 2022.

    Comments: Extended version of paper accepted to appear at the 61st IEEE Conference on Decision and Control (CDC), 2022

  10. arXiv:2203.14110  [pdf, other

    eess.SY

    Correct-By-Construction Design of Adaptive Cruise Control with Control Barrier Functions Under Safety and Regulatory Constraints

    Authors: Muhammad Waqas, Muhammad Ali Murtaza, Pierluigi Nuzzo, Petros Ioannou

    Abstract: The safety-critical nature of adaptive cruise control (ACC) systems calls for systematic design procedures, e.g., based on formal methods or control barrier functions (CBFs), to provide strong guarantees of safety and performance under all driving conditions. However, existing approaches have mostly focused on fully verified solutions under smooth traffic conditions, with the exception of stop-and… ▽ More

    Submitted 26 March, 2022; originally announced March 2022.

  11. arXiv:2203.09038  [pdf, other

    eess.SY

    Optimal Control of Partially Observable Markov Decision Processes with Finite Linear Temporal Logic Constraints

    Authors: Krishna C. Kalagarla, Dhruva Kartik, Dongming Shen, Rahul Jain, Ashutosh Nayyar, Pierluigi Nuzzo

    Abstract: Autonomous agents often operate in scenarios where the state is partially observed. In addition to maximizing their cumulative reward, agents must execute complex tasks with rich temporal and logical structures. These tasks can be expressed using temporal logic languages like finite linear temporal logic (LTL_f). This paper, for the first time, provides a structured framework for designing agent p… ▽ More

    Submitted 16 March, 2022; originally announced March 2022.

  12. arXiv:2201.05943  [pdf, other

    cs.CR eess.SY

    TriLock: IC Protection with Tunable Corruptibility and Resilience to SAT and Removal Attacks

    Authors: Yuke Zhang, Yinghua Hu, Pierluigi Nuzzo, Peter A. Beerel

    Abstract: Sequential logic locking has been studied over the last decade as a method to protect sequential circuits from reverse engineering. However, most of the existing sequential logic locking techniques are threatened by increasingly more sophisticated SAT-based attacks, efficiently using input queries to a SAT solver to rule out incorrect keys, as well as removal attacks based on structural analysis.… ▽ More

    Submitted 15 January, 2022; originally announced January 2022.

    Comments: Accepted at Design, Automation and Test in Europe Conference (DATE), 2022

  13. arXiv:2109.13377  [pdf, other

    eess.SY cs.AI cs.FL

    Model-Free Reinforcement Learning for Optimal Control of MarkovDecision Processes Under Signal Temporal Logic Specifications

    Authors: Krishna C. Kalagarla, Rahul Jain, Pierluigi Nuzzo

    Abstract: We present a model-free reinforcement learning algorithm to find an optimal policy for a finite-horizon Markov decision process while guaranteeing a desired lower bound on the probability of satisfying a signal temporal logic (STL) specification. We propose a method to effectively augment the MDP state space to capture the required state history and express the STL objective as a reachability obje… ▽ More

    Submitted 27 September, 2021; originally announced September 2021.

    Comments: Accepted for CDC 2021

  14. Fun-SAT: Functional Corruptibility-Guided SAT-Based Attack on Sequential Logic Encryption

    Authors: Yinghua Hu, Yuke Zhang, Kaixin Yang, Dake Chen, Peter A. Beerel, Pierluigi Nuzzo

    Abstract: The SAT attack has shown to be efficient against most combinational logic encryption methods. It can be extended to attack sequential logic encryption techniques by leveraging circuit unrolling and model checking methods. However, with no guidance on the number of times that a circuit needs to be unrolled to find the correct key, the attack tends to solve many time-consuming Boolean satisfiability… ▽ More

    Submitted 10 August, 2021; originally announced August 2021.

    Comments: Accepted at IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2021

  15. arXiv:2011.00632  [pdf, other

    eess.SY cs.FL

    Synthesis of Discounted-Reward Optimal Policies for Markov Decision Processes Under Linear Temporal Logic Specifications

    Authors: Krishna C. Kalagarla, Rahul Jain, Pierluigi Nuzzo

    Abstract: We present a method to find an optimal policy with respect to a reward function for a discounted Markov decision process under general linear temporal logic (LTL) specifications. Previous work has either focused on maximizing a cumulative reward objective under finite-duration tasks, specified by syntactically co-safe LTL, or maximizing an average reward for persistent (e.g., surveillance) tasks.… ▽ More

    Submitted 22 March, 2021; v1 submitted 1 November, 2020; originally announced November 2020.

    Comments: Accepted for ACC 2021

  16. SANSCrypt: A Sporadic-Authentication-Based Sequential Logic Encryption Scheme

    Authors: Yinghua Hu, Kaixin Yang, Shahin Nazarian, Pierluigi Nuzzo

    Abstract: We propose SANSCrypt, a novel sequential logic encryption scheme to protect integrated circuits against reverse engineering. Previous sequential encryption methods focus on modifying the circuit state machine such that the correct functionality can be accessed by applying the correct key sequence only once. Considering the risk associated with one-time authentication, SANSCrypt adopts a new tempor… ▽ More

    Submitted 11 October, 2020; originally announced October 2020.

    Comments: This paper has been accepted at the 28th IFIP/IEEE International Conference on Very Large Scale Integration (VLSI-SoC)

  17. arXiv:2009.11348  [pdf, ps, other

    cs.LG cs.AI eess.SY stat.ML

    A Sample-Efficient Algorithm for Episodic Finite-Horizon MDP with Constraints

    Authors: Krishna C. Kalagarla, Rahul Jain, Pierluigi Nuzzo

    Abstract: Constrained Markov Decision Processes (CMDPs) formalize sequential decision-making problems whose objective is to minimize a cost function while satisfying constraints on various cost functions. In this paper, we consider the setting of episodic fixed-horizon CMDPs. We propose an online algorithm which leverages the linear programming formulation of finite-horizon CMDP for repeated optimistic plan… ▽ More

    Submitted 23 September, 2020; originally announced September 2020.

  18. arXiv:1909.07917  [pdf, other

    cs.CR eess.SY

    Toward Efficient Evaluation of Logic Encryption Schemes: Models and Metrics

    Authors: Yinghua Hu, Vivek V. Menon, Andrew Schmidt, Joshua Monson, Matthew French, Pierluigi Nuzzo

    Abstract: Research in logic encryption over the last decade has resulted in various techniques to prevent different security threats such as Trojan insertion, intellectual property leakage, and reverse engineering. However, there is little agreement on a uniform set of metrics and models to efficiently assess the achieved security level and the trade-offs between security and overhead. This paper addresses… ▽ More

    Submitted 29 July, 2020; v1 submitted 13 September, 2019; originally announced September 2019.

    Comments: This report is an extended version of "Y. Hu, V. Venugopalan, A. Schmidt, J. Monson, M. French, and P. Nuzzo. Security-driven metrics and models for efficient evaluation of logic encryption schemes. In 2019 17th ACM/IEEE International Conference on Formal Methods and Models for System Design (MEMOCODE). ACM, 2019."

  19. arXiv:1705.09316  [pdf, other

    eess.SY cs.LO

    Stochastic Assume-Guarantee Contracts for Cyber-Physical System Design Under Probabilistic Requirements

    Authors: Jiwei Li, Pierluigi Nuzzo, Alberto Sangiovanni-Vincentelli, Yugeng Xi, Dewei Li

    Abstract: We develop an assume-guarantee contract framework for the design of cyber-physical systems, modeled as closed-loop control systems, under probabilistic requirements. We use a variant of signal temporal logic, namely, Stochastic Signal Temporal Logic (StSTL) to specify system behaviors as well as contract assumptions and guarantees, thus enabling automatic reasoning about requirements of stochastic… ▽ More

    Submitted 29 June, 2017; v1 submitted 25 May, 2017; originally announced May 2017.

    Comments: Extended version of conference paper submission

  20. arXiv:1602.01883  [pdf, other

    eess.SY cs.LO

    Diagnosis and Repair for Synthesis from Signal Temporal Logic Specifications

    Authors: Shromona Ghosh, Dorsa Sadigh, Pierluigi Nuzzo, Vasumathi Raman, Alexandre Donze, Alberto Sangiovanni-Vincentelli, S. Shankar Sastry, Sanjit A. Seshia

    Abstract: We address the problem of diagnosing and repairing specifications for hybrid systems formalized in signal temporal logic (STL). Our focus is on the setting of automatic synthesis of controllers in a model predictive control (MPC) framework. We build on recent approaches that reduce the controller synthesis problem to solving one or more mixed integer linear programs (MILPs), where infeasibility of… ▽ More

    Submitted 4 February, 2016; originally announced February 2016.

  21. arXiv:1509.03262  [pdf, other

    math.OC cs.CR cs.IT eess.SY

    A Satisfiability Modulo Theory Approach to Secure State Reconstruction in Differentially Flat Systems Under Sensor Attacks

    Authors: Yasser Shoukry, Pierluigi Nuzzo, Nicola Bezzo, Alberto L. Sangiovanni-Vincentelli, Sanjit A. Seshia, Paulo Tabuada

    Abstract: We address the problem of estimating the state of a differentially flat system from measurements that may be corrupted by an adversarial attack. In cyber-physical systems, malicious attacks can directly compromise the system's sensors or manipulate the communication between sensors and controllers. We consider attacks that only corrupt a subset of sensor measurements. We show that the possibility… ▽ More

    Submitted 10 September, 2015; originally announced September 2015.

    Comments: arXiv admin note: text overlap with arXiv:1412.4324

  22. arXiv:1412.4324  [pdf, other

    math.OC cs.CR cs.IT eess.SY

    Secure State Estimation For Cyber Physical Systems Under Sensor Attacks: A Satisfiability Modulo Theory Approach

    Authors: Yasser Shoukry, Pierluigi Nuzzo, Alberto Puggelli, Alberto L. Sangiovanni-Vincentelli, Sanjit A. Seshia, Paulo Tabuada

    Abstract: We address the problem of detecting and mitigating the effect of malicious attacks to the sensors of a linear dynamical system. We develop a novel, efficient algorithm that uses a Satisfiability-Modulo-Theory approach to isolate the compromised sensors and estimate the system state despite the presence of the attack, thus harnessing the intrinsic combinatorial complexity of the problem. By leverag… ▽ More

    Submitted 14 March, 2015; v1 submitted 14 December, 2014; originally announced December 2014.

  23. arXiv:1311.6092  [pdf, other

    eess.SY cs.SE

    Platform-Based Design Methodology and Modeling for Aircraft Electric Power Systems

    Authors: Pierluigi Nuzzo, John Finn, Mohammad Mozumdar, Alberto Sangiovanni-Vincentelli

    Abstract: In an aircraft electric power system (EPS), a supervisory control unit must actuate a set of switches to distribute power from generators to loads, while satisfying safety, reliability and real-time performance requirements. To reduce expensive re-design steps in current design methodologies, such a control problem is generally addressed based on minor incremental changes on top of consolidated so… ▽ More

    Submitted 24 November, 2013; originally announced November 2013.

    Comments: Proceedings of Green Energy and Systems Conference 2013, November 25, Long Beach, CA, USA