2018
DOI: 10.48550/arxiv.1801.05950
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Toward Scalable Verification for Safety-Critical Deep Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…Hardware Intrusion: HW intrusion means that the attacker inserts malware or trojan (typically in the form of circuitry modification) in the processing HW for performing attacks such as confidence reduction and misclassification. The potential countermeasures are the typical HW security techniques, like the built-in self-test (BIST) to verify the functionality of the processing HW, the side channel analysis-based monitoring [78]- [80] to detect and identify anomalous side channel signals, the formal method analysis to quickly and comprehensively analyze the behavior of the processing HW (e.g., using property checker [78], mathematical model [81], SAT solver [82], and SMT solver [83]).…”
Section: B Secure Ml: Attacks and Defensesmentioning
confidence: 99%
“…Hardware Intrusion: HW intrusion means that the attacker inserts malware or trojan (typically in the form of circuitry modification) in the processing HW for performing attacks such as confidence reduction and misclassification. The potential countermeasures are the typical HW security techniques, like the built-in self-test (BIST) to verify the functionality of the processing HW, the side channel analysis-based monitoring [78]- [80] to detect and identify anomalous side channel signals, the formal method analysis to quickly and comprehensively analyze the behavior of the processing HW (e.g., using property checker [78], mathematical model [81], SAT solver [82], and SMT solver [83]).…”
Section: B Secure Ml: Attacks and Defensesmentioning
confidence: 99%
“…Thus, the tests generated by OGMA can explore these large input space, potentially discovering more errors when compared to limiting the test generation via the training data. In contrast to previous works, OGMA is not limited to test specific applications [29] or properties [19], [41]. OGMA works completely blackbox and can be easily adapted to test real-world classification systems for a variety of different applications.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, the software engineering research community have stepped up to develop testing methodologies for deeplearning systems [19], [29], [36], [40]. These works, however are, limited either to specific applications [29] or rely on the presence of sample inputs [36], [44].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Applications of neural networks to safety-critical domains requires ensuring that they behave as expected under all circumstances [32]. One way to achieve this is to ensure that neural networks conform with a list of specifications, i.e., relationships between the inputs and outputs of a neural network that ought to be satisfied.…”
Section: Introductionmentioning
confidence: 99%