111,682 research outputs found
Recommended from our members
Building Blocks for Assurance Cases
The paper introduces an approach to structuring assurance cases using specially-designed CAE building blocks. The blocks are derived from an empirical analysis of the real case structures and can standardise the presentation of assurance cases by simplifying their architecture. CAE building blocks might also increase the precision and efficiency of the claims in arguments and can be used as self-contained reusable components of formal and semi-formal assurance cases
Recommended from our members
Tool Support for Assurance Case Building Blocks, Providing a Helping Hand with CAE
This paper presents a tool for structuring arguments in assurance cases. The tool is designed to support the methodology of Claims-Arguments-Evidence (CAE) Building Blocks that provides a series of archetypal CAE fragments to help structure cases more formally and systematically. It assists with the de-velopment and maintenance of structured assurance cases by providing facil-ities to manage CAE blocks and partially automate the generation of claim structures. In addition to the tool, new visual guidelines called “Helping hand” is provided to assist in applying the building blocks. The tool has been implemented on the Adelard ASCE platform. The target users are assurance case developers and reviewers. The tool and associated methodology can also be useful for people learning how to structure cases in a more rigorous and systematic manner
Recommended from our members
Disruptive Innovations and Disruptive Assurance: Assuring Machine Learning and Autonomy
Autonomous and machine learning-based systems are disruptive innovations and thus require a corresponding disruptive assurance strategy. We offer an overview of a framework based on claims, arguments, and evidence aimed at addressing these systems and use it to identify specific gaps, challenges, and potential solutions
Towards Identifying and closing Gaps in Assurance of autonomous Road vehicleS - a collection of Technical Notes Part 1
This report provides an introduction and overview of the Technical Topic Notes (TTNs) produced in the Towards Identifying and closing Gaps in Assurance of autonomous Road vehicleS (Tigars) project. These notes aim to support the development and evaluation of autonomous vehicles. Part 1 addresses: Assurance-overview and issues, Resilience and Safety Requirements, Open Systems Perspective and Formal Verification and Static Analysis of ML Systems. Part 2: Simulation and Dynamic Testing, Defence in Depth and Diversity, Security-Informed Safety Analysis, Standards and Guidelines
Lucky joint action
In this paper, I argue that joint action permits a certain degree of luck. The cases I have in mind exhibit the following structure: each participant believes that the intended ends of each robustly support the joint action. This belief turns out to be false. Due to lucky circumstances, the discordance in intention never becomes common knowledge. However, common knowledge of the relevant intentions would have undermined the joint action altogether. The analysis of such cases shows the extent to which common knowledge of the participants’ intentions can be harmful to joint action. This extends a recent line of research that has questioned the necessity of common knowledge in joint action
Recommendations for HER2 testing in the UK
Determining the HER2 status of breast carcinomas is a prerequisite for the use of the monoclonal antibody trastuzumab (Herceptin(R)), which has recently been licensed for the treatment of metastatic disease. This necessitates a test based on archival material. The preferred analyses are immunohistochemistry with fluorescent in situ hybridisation (FISH) as a follow up test for ambiguous results. Guidelines have been developed for standardised, well controlled procedures for the provision of reliable results. A group of three reference laboratories has been established to provide advice, quality assurance, and materials, where needed
SOTER: A Runtime Assurance Framework for Programming Safe Robotics Systems
The recent drive towards achieving greater autonomy and intelligence in
robotics has led to high levels of complexity. Autonomous robots increasingly
depend on third party off-the-shelf components and complex machine-learning
techniques. This trend makes it challenging to provide strong design-time
certification of correct operation.
To address these challenges, we present SOTER, a robotics programming
framework with two key components: (1) a programming language for implementing
and testing high-level reactive robotics software and (2) an integrated runtime
assurance (RTA) system that helps enable the use of uncertified components,
while still providing safety guarantees. SOTER provides language primitives to
declaratively construct a RTA module consisting of an advanced,
high-performance controller (uncertified), a safe, lower-performance controller
(certified), and the desired safety specification. The framework provides a
formal guarantee that a well-formed RTA module always satisfies the safety
specification, without completely sacrificing performance by using higher
performance uncertified components whenever safe. SOTER allows the complex
robotics software stack to be constructed as a composition of RTA modules,
where each uncertified component is protected using a RTA module.
To demonstrate the efficacy of our framework, we consider a real-world
case-study of building a safe drone surveillance system. Our experiments both
in simulation and on actual drones show that the SOTER-enabled RTA ensures the
safety of the system, including when untrusted third-party components have bugs
or deviate from the desired behavior
QuickSync: A Quickly Synchronizing PoS-Based Blockchain Protocol
To implement a blockchain, we need a blockchain protocol for all the nodes to
follow. To design a blockchain protocol, we need a block publisher selection
mechanism and a chain selection rule. In Proof-of-Stake (PoS) based blockchain
protocols, block publisher selection mechanism selects the node to publish the
next block based on the relative stake held by the node. However, PoS
protocols, such as Ouroboros v1, may face vulnerability to fully adaptive
corruptions.
In this paper, we propose a novel PoS-based blockchain protocol, QuickSync,
to achieve security against fully adaptive corruptions while improving on
performance. We propose a metric called block power, a value defined for each
block, derived from the output of the verifiable random function based on the
digital signature of the block publisher. With this metric, we compute chain
power, the sum of block powers of all the blocks comprising the chain, for all
the valid chains. These metrics are a function of the block publisher's stake
to enable the PoS aspect of the protocol. The chain selection rule selects the
chain with the highest chain power as the one to extend. This chain selection
rule hence determines the selected block publisher of the previous block. When
we use metrics to define the chain selection rule, it may lead to
vulnerabilities against Sybil attacks. QuickSync uses a Sybil attack resistant
function implemented using histogram matching. We prove that QuickSync
satisfies common prefix, chain growth, and chain quality properties and hence
it is secure. We also show that it is resilient to different types of
adversarial attack strategies. Our analysis demonstrates that QuickSync
performs better than Bitcoin by an order of magnitude on both transactions per
second and time to finality, and better than Ouroboros v1 by a factor of three
on time to finality
- …