Towards Identifying and closing Gaps in Assurance of autonomous Road vehicleS - a collection of Technical Notes Part 1

This report provides an introduction and overview of the Technical Topic Notes (TTNs) produced in the Towards Identifying and closing Gaps in Assurance of autonomous Road vehicleS (Tigars) project. These notes aim to support the development and evaluation of autonomous vehicles. Part 1 addresses: Assurance-overview and issues, Resilience and Safety Requirements, Open Systems Perspective and Formal Verification and Static Analysis of ML Systems. This report is Part 2 and discusses: Simulation and Dynamic Testing, Defence in Depth and Diversity, Security-Informed Safety Analysis, Standards and Guidelines.

[1]  Kathryn Cormican,et al.  An Ontology Model for Systems Engineering Derived from ISO/IEC/IEEE 15288: 2015: Systems and Software Engineering - System Life Cycle Processes , 2016 .

[2]  Philippa Gardner,et al.  Towards a program logic for JavaScript , 2012, POPL '12.

[3]  Rick Salay,et al.  Using Machine Learning Safely in Automotive Software: An Assessment and Adaption of Software Process Requirements in ISO 26262 , 2018, ArXiv.

[4]  Hoyt Lougee,et al.  SOFTWARE CONSIDERATIONS IN AIRBORNE SYSTEMS AND EQUIPMENT CERTIFICATION , 2001 .

[5]  Philip Koopman,et al.  Challenges in Autonomous Vehicle Testing and Validation , 2016 .

[6]  David Woods,et al.  Resilience Engineering: Concepts and Precepts , 2006 .

[7]  Mark W. Maier Architecting Principles for Systems‐of‐Systems , 1996 .

[8]  D. L. Simms,et al.  Normal Accidents: Living with High-Risk Technologies , 1986 .

[9]  M. Tokoro,et al.  Open Systems Science: From Understanding Principles to Solving Problems , 2010 .

[10]  David L. Dill,et al.  Developing Bug-Free Machine Learning Systems With Formal Mathematics , 2017, ICML.

[11]  Johann Schumann,et al.  On Verification & Validation of Neural Network Based Controllers , 2003 .

[12]  Michael P. Wellman,et al.  SoK: Security and Privacy in Machine Learning , 2018, 2018 IEEE European Symposium on Security and Privacy (EuroS&P).

[13]  Ryan P. Adams,et al.  Motivating the Rules of the Game for Adversarial Example Research , 2018, ArXiv.

[14]  Mykel J. Kochenderfer,et al.  Toward Scalable Verification for Safety-Critical Deep Networks , 2018, ArXiv.

[15]  Mykel J. Kochenderfer,et al.  Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks , 2017, CAV.

[16]  Mykel J. Kochenderfer,et al.  The Marabou Framework for Verification and Analysis of Deep Neural Networks , 2019, CAV.

[17]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[18]  Xiaowei Huang,et al.  Reachability Analysis of Deep Neural Networks with Provable Guarantees , 2018, IJCAI.

[19]  Adi Shamir,et al.  A Simple Explanation for the Existence of Adversarial Examples with Small Hamming Distance , 2019, ArXiv.

[20]  Joan Bruna,et al.  Intriguing properties of neural networks , 2013, ICLR.

[21]  Luca Pulina,et al.  An Abstraction-Refinement Approach to Verification of Artificial Neural Networks , 2010, CAV.

[22]  Mark W. Maier,et al.  Architecting Principles for Systems‐of‐Systems , 1996 .

[23]  Robert J. Stroud,et al.  The Risk Assessment of ERTMS-Based Railway Systems from a Cyber Security Perspective: Methodology and Lessons Learned , 2016, RSSRail.

[24]  Mario Tokoro Open Systems Dependability , 2012 .

[25]  Insup Lee,et al.  A Study on Run Time Assurance for Complex Cyber Physical Systems , 2013 .

[26]  Min Wu,et al.  Safety Verification of Deep Neural Networks , 2016, CAV.

[27]  Ieee Std,et al.  Systems and Software Engineering— Systems and Software Assurance— Part 1: Concepts and Vocabulary , 2011 .

[28]  R. Bell,et al.  IEC 61508: functional safety of electrical/electronic/ programme electronic safety-related systems: overview , 1999 .