Zum Hauptinhalt springen

Showing 1–20 of 20 results for author: Chechik, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.14074  [pdf, other

    cs.SE

    Abstraction Engineering

    Authors: Nelly Bencomo, Jordi Cabot, Marsha Chechik, Betty H. C. Cheng, Benoit Combemale, Andrzej Wąsowski, Steffen Zschaler

    Abstract: Modern software-based systems operate under rapidly changing conditions and face ever-increasing uncertainty. In response, systems are increasingly adaptive and reliant on artificial-intelligence methods. In addition to the ubiquity of software with respect to users and application areas (e.g., transportation, smart grids, medicine, etc.), these high-impact software systems necessarily draw from m… ▽ More

    Submitted 26 August, 2024; originally announced August 2024.

  2. arXiv:2407.10345  [pdf, other

    cs.SE

    PLACIDUS: Engineering Product Lines of Rigorous Assurance Cases

    Authors: Logan Murphy, Torin Viger, Alessio Di Sandro, Marsha Chechik

    Abstract: In critical software engineering, structured assurance cases (ACs) are used to demonstrate how key properties (e.g., safety, security) are supported by evidence artifacts (e.g., test results, proofs). ACs can also be studied as formal objects in themselves, such that formal methods can be used to establish their correctness. Creating rigorous ACs is particularly challenging in the context of softw… ▽ More

    Submitted 14 July, 2024; originally announced July 2024.

  3. arXiv:2406.08216  [pdf, ps, other

    cs.SE

    A Software Engineering Perspective on Testing Large Language Models: Research, Practice, Tools and Benchmarks

    Authors: Sinclair Hudson, Sophia Jit, Boyue Caroline Hu, Marsha Chechik

    Abstract: Large Language Models (LLMs) are rapidly becoming ubiquitous both as stand-alone tools and as components of current and future software systems. To enable usage of LLMs in the high-stake or safety-critical systems of 2030, they need to undergo rigorous testing. Software Engineering (SE) research on testing Machine Learning (ML) components and ML-based systems has systematically explored many topic… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

  4. arXiv:2404.12335  [pdf, other

    cs.SE

    Normative Requirements Operationalization with Large Language Models

    Authors: Nick Feng, Lina Marsso, S. Getir Yaman, Isobel Standen, Yesugen Baatartogtokh, Reem Ayad, Victória Oldemburgo de Mello, Bev Townsend, Hanne Bartels, Ana Cavalcanti, Radu Calinescu, Marsha Chechik

    Abstract: Normative non-functional requirements specify constraints that a system must observe in order to avoid violations of social, legal, ethical, empathetic, and cultural norms. As these requirements are typically defined by non-technical system stakeholders with different expertise and priorities (ethicists, lawyers, social scientists, etc.), ensuring their well-formedness and consistency is very chal… ▽ More

    Submitted 28 May, 2024; v1 submitted 18 April, 2024; originally announced April 2024.

  5. arXiv:2402.19401  [pdf, other

    cs.CV

    Assessing Visually-Continuous Corruption Robustness of Neural Networks Relative to Human Performance

    Authors: Huakun Shen, Boyue Caroline Hu, Krzysztof Czarnecki, Lina Marsso, Marsha Chechik

    Abstract: While Neural Networks (NNs) have surpassed human accuracy in image classification on ImageNet, they often lack robustness against image corruption, i.e., corruption robustness. Yet such robustness is seemingly effortless for human perception. In this paper, we propose visually-continuous corruption robustness (VCR) -- an extension of corruption robustness to allow assessing it over the wide and co… ▽ More

    Submitted 29 February, 2024; originally announced February 2024.

  6. Analyzing and Debugging Normative Requirements via Satisfiability Checking

    Authors: Nick Feng, Lina Marsso, Sinem Getir Yaman, Yesugen Baatartogtokh, Reem Ayad, Victória Oldemburgo de Mello, Beverley Townsend, Isobel Standen, Ioannis Stefanakos, Calum Imrie, Genaína Nunes Rodrigues, Ana Cavalcanti, Radu Calinescu, Marsha Chechik

    Abstract: As software systems increasingly interact with humans in application domains such as transportation and healthcare, they raise concerns related to the social, legal, ethical, empathetic, and cultural (SLEEC) norms and values of their stakeholders. Normative non-functional requirements (N-NFRs) are used to capture these concerns by setting SLEEC-relevant boundaries for system behavior. Since N-NFRs… ▽ More

    Submitted 11 January, 2024; originally announced January 2024.

  7. arXiv:2311.07495  [pdf, other

    cs.SE

    The Last Decade in Review: Tracing the Evolution of Safety Assurance Cases through a Comprehensive Bibliometric Analysis

    Authors: Mithila Sivakumar, Alvine Boaye Belle, Jinjun Shan, Opeyemi Adesina, Song Wang, Marsha Chechik, Marios Fokaefs, Kimya Khakzad Shahandashti, Oluwafemi Odu

    Abstract: Safety assurance is of paramount importance across various domains, including automotive, aerospace, and nuclear energy, where the reliability and acceptability of mission-critical systems are imperative. This assurance is effectively realized through the utilization of Safety Assurance Cases. The use of safety assurance cases allows for verifying the correctness of the created systems capabilitie… ▽ More

    Submitted 13 November, 2023; originally announced November 2023.

  8. arXiv:2209.04052  [pdf, ps, other

    cs.SE

    Early Verification of Legal Compliance via Bounded Satisfiability Checking

    Authors: Nick Feng, Lina Marsso, Mehrdad Sabetzadeh, Marsha Chechik

    Abstract: Legal properties involve reasoning about data values and time. Metric first-order temporal logic (MFOTL) provides a rich formalism for specifying legal properties. While MFOTL has been successfully used for verifying legal properties over operational systems via runtime monitoring, no solution exists for MFOTL-based verification in early-stage system development captured by requirements. Given a l… ▽ More

    Submitted 27 May, 2023; v1 submitted 8 September, 2022; originally announced September 2022.

  9. If a Human Can See It, So Should Your System: Reliability Requirements for Machine Vision Components

    Authors: Boyue Caroline Hu, Lina Marsso, Krzysztof Czarnecki, Rick Salay, Huakun Shen, Marsha Chechik

    Abstract: Machine Vision Components (MVC) are becoming safety-critical. Assuring their quality, including safety, is essential for their successful deployment. Assurance relies on the availability of precisely specified and, ideally, machine-verifiable requirements. MVCs with state-of-the-art performance rely on machine learning (ML) and training data but largely lack such requirements. In this paper, we… ▽ More

    Submitted 8 February, 2022; originally announced February 2022.

  10. arXiv:2107.07690  [pdf, other

    cs.SE

    Applying Declarative Analysis to Software Product Line Models: An Industrial Study

    Authors: Ramy Shahin, Robert Hackman, Rafael Toledo, Ramesh S, Joanne M. Atlee, Marsha Chechik

    Abstract: Software Product Lines (SPLs) are families of related software products developed from a common set of artifacts. Most existing analysis tools can be applied to a single product at a time, but not to an entire SPL. Some tools have been redesigned/re-implemented to support the kind of variability exhibited in SPLs, but this usually takes a lot of effort, and is error-prone. Declarative analyses wri… ▽ More

    Submitted 30 July, 2021; v1 submitted 15 July, 2021; originally announced July 2021.

    Comments: MODELS'21 pre-print

  11. arXiv:2105.00041  [pdf, other

    cs.SE

    Towards Certified Analysis of Software Product Line Safety Cases

    Authors: Ramy Shahin, Sahar Kokaly, Marsha Chechik

    Abstract: Safety-critical software systems are in many cases designed and implemented as families of products, usually referred to as Software Product Lines (SPLs). Products within an SPL vary from each other in terms of which features they include. Applying existing analysis techniques to SPLs and their safety cases is usually challenging because of the potentially exponential number of products with respe… ▽ More

    Submitted 30 April, 2021; originally announced May 2021.

    Comments: Safecomp'21 pre-print

  12. arXiv:2010.00697  [pdf, other

    cs.PL cs.SE

    Automatic and Efficient Variability-Aware Lifting of Functional Programs

    Authors: Ramy Shahin, Marsha Chechik

    Abstract: A software analysis is a computer program that takes some representation of a software product as input and produces some useful information about that product as output. A software product line encompasses \emph{many} software product variants, and thus existing analyses can be applied to each of the product variations individually, but not to the entire product line as a whole. Enumerating all p… ▽ More

    Submitted 1 October, 2020; originally announced October 2020.

    Comments: OOPSLA'20 pre-print

  13. Variability-aware Datalog

    Authors: Ramy Shahin, Marsha Chechik

    Abstract: Variability-aware computing is the efficient application of programs to different sets of inputs that exhibit some variability. One example is program analyses applied to Software Product Lines (SPLs). In this paper we present the design and development of a variability-aware version of the Soufflé Datalog engine. The engine can take facts annotated with Presence Conditions (PCs) as input, and com… ▽ More

    Submitted 9 December, 2019; originally announced December 2019.

    Comments: PADL'20 paper

  14. arXiv:1907.02192  [pdf, other

    cs.SE cs.LO cs.PL

    Lifting Datalog-Based Analyses to Software Product Lines

    Authors: Ramy Shahin, Marsha Chechik, Rick Salay

    Abstract: Applying program analyses to Software Product Lines (SPLs) has been a fundamental research problem at the intersection of Product Line Engineering and software analysis. Different attempts have been made to "lift" particular product-level analyses to run on the entire product line. In this paper, we tackle the class of Datalog-based analyses (e.g., pointer and taint analyses), study the theoretica… ▽ More

    Submitted 15 July, 2019; v1 submitted 3 July, 2019; originally announced July 2019.

    Comments: FSE'19 paper

  15. Optimizing Computation of Recovery Plans for BPEL Applications

    Authors: Jocelyn Simmonds, Shoham Ben-David, Marsha Chechik

    Abstract: Web service applications are distributed processes that are composed of dynamically bounded services. In our previous work [15], we have described a framework for performing runtime monitoring of web service against behavioural correctness properties (described using property patterns and converted into finite state automata). These specify forbidden behavior (safety properties) and desired behavi… ▽ More

    Submitted 20 September, 2010; originally announced September 2010.

    Comments: In Proceedings TAV-WEB 2010, arXiv:1009.3306

    ACM Class: D.2.2; D.2.5; H.3.5

    Journal ref: EPTCS 35, 2010, pp. 3-14

  16. arXiv:1002.4616  [pdf, ps, other

    cs.LO

    Robust Vacuity for Branching Temporal Logic

    Authors: Arie Gurfinkel, Marsha Chechik

    Abstract: There is a growing interest in techniques for detecting whether a logic specification is satisfied too easily, or vacuously. For example, the specification "every request is eventually followed by an acknowledgment" is satisfied vacuously by a system that never generates any requests. Vacuous satisfaction misleads users of model-checking into thinking that a system is correct. There are several… ▽ More

    Submitted 13 October, 2010; v1 submitted 24 February, 2010; originally announced February 2010.

    ACM Class: D.2.4

  17. arXiv:cs/9906032  [pdf, ps, other

    cs.SE

    Formal Modeling in a Commercial Setting: A Case Study

    Authors: A. Wong, M. Chechik

    Abstract: This paper describes a case study conducted in collaboration with Nortel to demonstrate the feasibility of applying formal modeling techniques to telecommunication systems. A formal description language, SDL, was chosen by our qualitative CASE tool evaluation to model a multimedia-messaging system described by an 80-page natural language specification. Our model was used to identify errors in th… ▽ More

    Submitted 29 June, 1999; originally announced June 1999.

    Comments: 18 pages, 5 figures, to appear in Proceedings of FM'99: World Congress on Formal Methods, September 1999

    ACM Class: F.3.1; K.6.3; D.2.7; D.2.5; D.2.1; C.3; D.2.4

  18. Events in Linear-Time Properties

    Authors: D. Paun, M. Chechik

    Abstract: For over a decade, researchers in formal methods tried to create formalisms that permit natural specification of systems and allow mathematical reasoning about their correctness. The availability of fully-automated reasoning tools enables more non-specialists to use formal methods effectively --- their responsibility reduces to just specifying the model and expressing the desired properties. Thu… ▽ More

    Submitted 28 June, 1999; originally announced June 1999.

    Comments: 10 pages, 4 figures

    ACM Class: D.2.4; F.3.1; F.4.1; I.2.4; D.2.1

    Journal ref: Proceedings of 4th IEEE International Symposium on Requirements Engineering, June 1999, pp. 123-132

  19. arXiv:cs/9906030  [pdf, ps, other

    cs.SE

    SCR3: towards usability of formal methods

    Authors: M. Chechik

    Abstract: This paper gives an overview of SCR3 -- a toolset designed to increase the usability of formal methods for software development. Formal requirements are specified in SCR3 in an easy to use and review format, and then used in checking requirements for correctness and in verifying consistency between annotated code and requirements. In this paper we discuss motivations behind this work, describe… ▽ More

    Submitted 28 June, 1999; originally announced June 1999.

    Comments: 15 pages, 10 figures

    ACM Class: D.2.4; D.2.6; D.2.2; D.2.1

    Journal ref: Proceedings of CASCON'98, December 1998, pp. 177-191

  20. arXiv:cs/9906029  [pdf, ps, other

    cs.SE cs.AI cs.CL cs.SC

    Events in Property Patterns

    Authors: M. Chechik, D. Paun

    Abstract: A pattern-based approach to the presentation, codification and reuse of property specifications for finite-state verification was proposed by Dwyer and his collegues. The patterns enable non-experts to read and write formal specifications for realistic systems and facilitate easy conversion of specifications between formalisms, such as LTL, CTL, QRE. In this paper, we extend the pattern system w… ▽ More

    Submitted 29 June, 1999; v1 submitted 28 June, 1999; originally announced June 1999.

    Comments: 14 pages, 3 figures

    ACM Class: D.2.4; F.3.1; F.4.1; I.2.4; D.2.1

    Journal ref: Lecture notes in Computer Science (Proceedings of 6 Spin'99 Workshop)