Zum Hauptinhalt springen

Showing 1–10 of 10 results for author: Marsso, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.12335  [pdf, other

    cs.SE

    Normative Requirements Operationalization with Large Language Models

    Authors: Nick Feng, Lina Marsso, S. Getir Yaman, Isobel Standen, Yesugen Baatartogtokh, Reem Ayad, Victória Oldemburgo de Mello, Bev Townsend, Hanne Bartels, Ana Cavalcanti, Radu Calinescu, Marsha Chechik

    Abstract: Normative non-functional requirements specify constraints that a system must observe in order to avoid violations of social, legal, ethical, empathetic, and cultural norms. As these requirements are typically defined by non-technical system stakeholders with different expertise and priorities (ethicists, lawyers, social scientists, etc.), ensuring their well-formedness and consistency is very chal… ▽ More

    Submitted 28 May, 2024; v1 submitted 18 April, 2024; originally announced April 2024.

  2. arXiv:2402.19401  [pdf, other

    cs.CV

    Assessing Visually-Continuous Corruption Robustness of Neural Networks Relative to Human Performance

    Authors: Huakun Shen, Boyue Caroline Hu, Krzysztof Czarnecki, Lina Marsso, Marsha Chechik

    Abstract: While Neural Networks (NNs) have surpassed human accuracy in image classification on ImageNet, they often lack robustness against image corruption, i.e., corruption robustness. Yet such robustness is seemingly effortless for human perception. In this paper, we propose visually-continuous corruption robustness (VCR) -- an extension of corruption robustness to allow assessing it over the wide and co… ▽ More

    Submitted 29 February, 2024; originally announced February 2024.

  3. Analyzing and Debugging Normative Requirements via Satisfiability Checking

    Authors: Nick Feng, Lina Marsso, Sinem Getir Yaman, Yesugen Baatartogtokh, Reem Ayad, Victória Oldemburgo de Mello, Beverley Townsend, Isobel Standen, Ioannis Stefanakos, Calum Imrie, Genaína Nunes Rodrigues, Ana Cavalcanti, Radu Calinescu, Marsha Chechik

    Abstract: As software systems increasingly interact with humans in application domains such as transportation and healthcare, they raise concerns related to the social, legal, ethical, empathetic, and cultural (SLEEC) norms and values of their stakeholders. Normative non-functional requirements (N-NFRs) are used to capture these concerns by setting SLEEC-relevant boundaries for system behavior. Since N-NFRs… ▽ More

    Submitted 11 January, 2024; originally announced January 2024.

  4. arXiv:2209.04052  [pdf, ps, other

    cs.SE

    Early Verification of Legal Compliance via Bounded Satisfiability Checking

    Authors: Nick Feng, Lina Marsso, Mehrdad Sabetzadeh, Marsha Chechik

    Abstract: Legal properties involve reasoning about data values and time. Metric first-order temporal logic (MFOTL) provides a rich formalism for specifying legal properties. While MFOTL has been successfully used for verifying legal properties over operational systems via runtime monitoring, no solution exists for MFOTL-based verification in early-stage system development captured by requirements. Given a l… ▽ More

    Submitted 27 May, 2023; v1 submitted 8 September, 2022; originally announced September 2022.

  5. Formally Modeling Autonomous Vehicles in LNT for Simulation and Testing

    Authors: Lina Marsso, Radu Mateescu, Lucie Muller, Wendelin Serwe

    Abstract: We present two behavioral models of an autonomous vehicle and its interaction with the environment. Both models use the formal modeling language LNT provided by the CADP toolbox. This paper discusses the modeling choices and the challenges of our autonomous vehicle models, and also illustrates how formal validation tools can be applied to a single component or the overall vehicle.

    Submitted 18 March, 2022; originally announced March 2022.

    Comments: In Proceedings MARS 2022, arXiv:2203.09299

    Journal ref: EPTCS 355, 2022, pp. 60-117

  6. If a Human Can See It, So Should Your System: Reliability Requirements for Machine Vision Components

    Authors: Boyue Caroline Hu, Lina Marsso, Krzysztof Czarnecki, Rick Salay, Huakun Shen, Marsha Chechik

    Abstract: Machine Vision Components (MVC) are becoming safety-critical. Assuring their quality, including safety, is essential for their successful deployment. Assurance relies on the availability of precisely specified and, ideally, machine-verifiable requirements. MVCs with state-of-the-art performance rely on machine learning (ML) and training data but largely lack such requirements. In this paper, we… ▽ More

    Submitted 8 February, 2022; originally announced February 2022.

  7. Specifying a Cryptographical Protocol in Lustre and SCADE

    Authors: Lina Marsso

    Abstract: We present SCADE and Lustre models of the Message Authenticator Algorithm (MAA), which is one of the first cryptographic functions for computing a message authentication code. The MAA was adopted between 1987 and 2001, in international standards (ISO 8730 and ISO 8731-2), to ensure the authenticity and integrity of banking transactions. This paper discusses the choices and the challenges of our MA… ▽ More

    Submitted 28 April, 2020; originally announced April 2020.

    Comments: In Proceedings MARS 2020, arXiv:2004.12403. arXiv admin note: text overlap with arXiv:1703.06573

    Journal ref: EPTCS 316, 2020, pp. 149-199

  8. arXiv:1803.10322  [pdf, ps, other

    cs.PL cs.CR cs.SE

    Comparative Study of Eight Formal Specifications of the Message Authenticator Algorithm

    Authors: Hubert Garavel, Lina Marsso

    Abstract: The Message Authenticator Algorithm (MAA) is one of the first cryptographic functions for computing a Message Authentication Code. Between 1987 and 2001, the MAA was adopted in international standards (ISO 8730 and ISO 8731-2) to ensure the authenticity and integrity of banking transactions. In 1990 and 1991, three formal, yet non-executable, specifications of the MAA (in VDM, Z, and LOTOS) were d… ▽ More

    Submitted 27 March, 2018; originally announced March 2018.

    Comments: In Proceedings MARS/VPT 2018, arXiv:1803.08668

    Journal ref: EPTCS 268, 2018, pp. 41-87

  9. A Formal TLS Handshake Model in LNT

    Authors: Josip Bozic, Lina Marsso, Radu Mateescu, Franz Wotawa

    Abstract: Testing of network services represents one of the biggest challenges in cyber security. Because new vulnerabilities are detected on a regular basis, more research is needed. These faults have their roots in the software development cycle or because of intrinsic leaks in the system specification. Conformance testing checks whether a system behaves according to its specification. Here model-based te… ▽ More

    Submitted 27 March, 2018; originally announced March 2018.

    Comments: In Proceedings MARS/VPT 2018, arXiv:1803.08668

    Journal ref: EPTCS 268, 2018, pp. 1-40

  10. arXiv:1703.06573  [pdf, ps, other

    cs.CR cs.LO cs.SE

    A Large Term Rewrite System Modelling a Pioneering Cryptographic Algorithm

    Authors: Hubert Garavel, Lina Marsso

    Abstract: We present a term rewrite system that formally models the Message Authenticator Algorithm (MAA), which was one of the first cryptographic functions for computing a Message Authentication Code and was adopted, between 1987 and 2001, in international standards (ISO 8730 and ISO 8731-2) to ensure the authenticity and integrity of banking transactions. Our term rewrite system is large (13 sorts,… ▽ More

    Submitted 19 March, 2017; originally announced March 2017.

    Comments: In Proceedings MARS 2017, arXiv:1703.05812

    Journal ref: EPTCS 244, 2017, pp. 129-183