Skip to main content

Showing 1–20 of 20 results for author: Lutz, R

Searching in archive cs. Search in all archives.
.
  1. A Family-Based Approach to Safety Cases for Controlled Airspaces in Small Uncrewed Aerial Systems

    Authors: Michael C. Hunter, Usman Gohar, Myra B. Cohen, Robyn R. Lutz, Jane Cleland-Huang

    Abstract: As small Uncrewed Aircraft Systems (sUAS) increasingly operate in the national airspace, safety concerns arise due to a corresponding rise in reported airspace violations and incidents, highlighting the need for a safe mechanism for sUAS entry control to manage the potential overload. This paper presents work toward our aim of establishing automated, customized safety-claim support for managing on… ▽ More

    Submitted 4 February, 2025; originally announced February 2025.

    Comments: Accepted at AIAA 2024

  2. arXiv:2502.00238  [pdf, other

    cs.SE

    A Taxonomy of Real-World Defeaters in Safety Assurance Cases

    Authors: Usman Gohar, Michael C. Hunter, Myra B. Cohen, Robyn R. Lutz

    Abstract: The rise of cyber-physical systems in safety-critical domains calls for robust risk-evaluation frameworks. Assurance cases, often required by regulatory bodies, are a structured approach to demonstrate that a system meets its safety requirements. However, assurance cases are fraught with challenges, such as incomplete evidence and gaps in reasoning, called defeaters, that can call into question th… ▽ More

    Submitted 31 January, 2025; originally announced February 2025.

    Comments: ICSE 2025, Workshop on Multi-disciplinary, Open, and integRatEd Requirements Engineering

  3. arXiv:2501.07238  [pdf, other

    cs.AI

    Lessons From Red Teaming 100 Generative AI Products

    Authors: Blake Bullwinkel, Amanda Minnich, Shiven Chawla, Gary Lopez, Martin Pouliot, Whitney Maxwell, Joris de Gruyter, Katherine Pratt, Saphir Qi, Nina Chikanov, Roman Lutz, Raja Sekhar Rao Dheekonda, Bolor-Erdene Jagdagdorj, Eugenia Kim, Justin Song, Keegan Hines, Daniel Jones, Giorgio Severi, Richard Lundeen, Sam Vaughan, Victoria Westerhoff, Pete Bryan, Ram Shankar Siva Kumar, Yonatan Zunger, Chang Kawaguchi , et al. (1 additional authors not shown)

    Abstract: In recent years, AI red teaming has emerged as a practice for probing the safety and security of generative AI systems. Due to the nascency of the field, there are many open questions about how red teaming operations should be conducted. Based on our experience red teaming over 100 generative AI products at Microsoft, we present our internal threat model ontology and eight main lessons we have lea… ▽ More

    Submitted 13 January, 2025; originally announced January 2025.

  4. arXiv:2410.02828  [pdf, other

    cs.CR cs.AI cs.CL

    PyRIT: A Framework for Security Risk Identification and Red Teaming in Generative AI System

    Authors: Gary D. Lopez Munoz, Amanda J. Minnich, Roman Lutz, Richard Lundeen, Raja Sekhar Rao Dheekonda, Nina Chikanov, Bolor-Erdene Jagdagdorj, Martin Pouliot, Shiven Chawla, Whitney Maxwell, Blake Bullwinkel, Katherine Pratt, Joris de Gruyter, Charlotte Siska, Pete Bryan, Tori Westerhoff, Chang Kawaguchi, Christian Seifert, Ram Shankar Siva Kumar, Yonatan Zunger

    Abstract: Generative Artificial Intelligence (GenAI) is becoming ubiquitous in our daily lives. The increase in computational power and data availability has led to a proliferation of both single- and multi-modal models. As the GenAI ecosystem matures, the need for extensible and model-agnostic risk identification frameworks is growing. To meet this need, we introduce the Python Risk Identification Toolkit… ▽ More

    Submitted 1 October, 2024; originally announced October 2024.

  5. arXiv:2407.13833  [pdf, other

    cs.CL cs.AI

    Phi-3 Safety Post-Training: Aligning Language Models with a "Break-Fix" Cycle

    Authors: Emman Haider, Daniel Perez-Becker, Thomas Portet, Piyush Madan, Amit Garg, Atabak Ashfaq, David Majercak, Wen Wen, Dongwoo Kim, Ziyi Yang, Jianwen Zhang, Hiteshi Sharma, Blake Bullwinkel, Martin Pouliot, Amanda Minnich, Shiven Chawla, Solianna Herrera, Shahed Warreth, Maggie Engler, Gary Lopez, Nina Chikanov, Raja Sekhar Rao Dheekonda, Bolor-Erdene Jagdagdorj, Roman Lutz, Richard Lundeen , et al. (6 additional authors not shown)

    Abstract: Recent innovations in language model training have demonstrated that it is possible to create highly performant models that are small enough to run on a smartphone. As these models are deployed in an increasing number of domains, it is critical to ensure that they are aligned with human preferences and safety considerations. In this report, we present our methodology for safety aligning the Phi-3… ▽ More

    Submitted 22 August, 2024; v1 submitted 18 July, 2024; originally announced July 2024.

  6. arXiv:2407.13717  [pdf, other

    cs.SE cs.AI

    CoDefeater: Using LLMs To Find Defeaters in Assurance Cases

    Authors: Usman Gohar, Michael C. Hunter, Robyn R. Lutz, Myra B. Cohen

    Abstract: Constructing assurance cases is a widely used, and sometimes required, process toward demonstrating that safety-critical systems will operate safely in their planned environment. To mitigate the risk of errors and missing edge cases, the concept of defeaters - arguments or evidence that challenge claims in an assurance case - has been introduced. Defeaters can provide timely detection of weaknesse… ▽ More

    Submitted 16 August, 2024; v1 submitted 18 July, 2024; originally announced July 2024.

    Comments: ASE 2024 NIER

  7. arXiv:2401.07898  [pdf, other

    cs.SE

    Generating Maximal Configurations and Their Variants Using Code Metrics

    Authors: Tuba Yavuz, Chin Khor, Ken, Bai, Robyn Lutz

    Abstract: Testing configurable systems continues to be challenging and costly. Generation of configurations for testing tends to use either techniques based on semantic sampling (e.g., logical formulas over configuration variables, often called presence conditions) or structural code metrics (e.g., code coverage). In this paper we describe our hybrid approaches that combine these two kinds of techniques to… ▽ More

    Submitted 15 January, 2024; originally announced January 2024.

  8. arXiv:2401.07353  [pdf, other

    cs.SE cs.AI cs.LG

    Towards Engineering Fair and Equitable Software Systems for Managing Low-Altitude Airspace Authorizations

    Authors: Usman Gohar, Michael C. Hunter, Agnieszka Marczak-Czajka, Robyn R. Lutz, Myra B. Cohen, Jane Cleland-Huang

    Abstract: Small Unmanned Aircraft Systems (sUAS) have gained widespread adoption across a diverse range of applications. This has introduced operational complexities within shared airspaces and an increase in reported incidents, raising safety concerns. In response, the U.S. Federal Aviation Administration (FAA) is developing a UAS Traffic Management (UTM) system to control access to airspace based on an sU… ▽ More

    Submitted 3 February, 2024; v1 submitted 14 January, 2024; originally announced January 2024.

    Journal ref: ICSE-SEIS 2024

  9. arXiv:2310.17750  [pdf, other

    cs.CL

    A Framework for Automated Measurement of Responsible AI Harms in Generative AI Applications

    Authors: Ahmed Magooda, Alec Helyar, Kyle Jackson, David Sullivan, Chad Atalla, Emily Sheng, Dan Vann, Richard Edgar, Hamid Palangi, Roman Lutz, Hongliang Kong, Vincent Yun, Eslam Kamal, Federico Zarfati, Hanna Wallach, Sarah Bird, Mei Chen

    Abstract: We present a framework for the automated measurement of responsible AI (RAI) metrics for large language models (LLMs) and associated products and services. Our framework for automatically measuring harms from LLMs builds on existing technical and sociotechnical expertise and leverages the capabilities of state-of-the-art LLMs, such as GPT-4. We use this framework to run through several case studie… ▽ More

    Submitted 26 October, 2023; originally announced October 2023.

    Comments: This is a living document

  10. arXiv:2309.03392  [pdf, other

    cs.SE

    Requirements Analysis of Variability Constraints in a Configurable Flight Software System

    Authors: Chin Khor, Robyn Lutz

    Abstract: Variability constraints are an integral part of the requirements for a configurable system. The constraints specified in the requirements on the legal combinations of options define the space of potential valid configurations for the system-to-be. This paper reports on our experience with the variability-related requirements constraints of a flight software framework used by multiple space mission… ▽ More

    Submitted 6 September, 2023; originally announced September 2023.

    Comments: 11 pages, 8 figures, 6 tables, RE2023

  11. arXiv:2303.16626  [pdf, ps, other

    cs.LG cs.AI cs.CY

    Fairlearn: Assessing and Improving Fairness of AI Systems

    Authors: Hilde Weerts, Miroslav Dudík, Richard Edgar, Adrin Jalali, Roman Lutz, Michael Madaio

    Abstract: Fairlearn is an open source project to help practitioners assess and improve fairness of artificial intelligence (AI) systems. The associated Python library, also named fairlearn, supports evaluation of a model's output across affected populations and includes several algorithms for mitigating fairness issues. Grounded in the understanding that fairness is a sociotechnical challenge, the project i… ▽ More

    Submitted 29 March, 2023; originally announced March 2023.

  12. arXiv:2207.05710  [pdf

    cs.SE cs.LG

    The Untold Impact of Learning Approaches on Software Fault-Proneness Predictions

    Authors: Mohammad Jamil Ahmad, Katerina Goseva-Popstojanova, Robyn R. Lutz

    Abstract: Software fault-proneness prediction is an active research area, with many factors affecting prediction performance extensively studied. However, the impact of the learning approach (i.e., the specifics of the data used for training and the target variable being predicted) on the prediction performance has not been studied, except for one initial work. This paper explores the effects of two learnin… ▽ More

    Submitted 12 July, 2022; originally announced July 2022.

  13. arXiv:2104.07844  [pdf, other

    cs.SE

    Learning Feature Interactions With and Without Specifications

    Authors: Seyedehzahra Khoshmanesh, Tuba Yavuz, Robyn R. Lutz

    Abstract: Features in product lines and highly configurable systems can interact in ways that are contrary to developers' intent. Current methods to identify such unanticipated feature interactions are costly and inadequate. To address this problem we propose a new approach to learn feature interactions, both in those product lines where constraints on feature combinations are specified and in feature-rich… ▽ More

    Submitted 15 April, 2021; originally announced April 2021.

  14. arXiv:2009.07392  [pdf, other

    cs.SE cs.LG cs.SI

    Does Link Prediction Help Detect Feature Interactions in Software Product Lines (SPLs)?

    Authors: Seyedehzahra Khoshmanesh, Robyn Lutz

    Abstract: An ongoing challenge for the requirements engineering of software product lines is to predict whether a new combination of features (units of functionality) will create an unwanted or even hazardous feature interaction. We thus seek to improve and automate the prediction of unwanted feature interactions early in development. In this paper, we show how the detection of unwanted feature interactions… ▽ More

    Submitted 15 September, 2020; originally announced September 2020.

  15. arXiv:1909.05390  [pdf, other

    cs.ET q-bio.MN

    Population-Induced Phase Transitions and the Verification of Chemical Reaction Networks

    Authors: James I. Lathrop, Jack H. Lutz, Robyn R. Lutz, Hugh D. Potter, Matthew R. Riley

    Abstract: We show that very simple molecular systems, modeled as chemical reaction networks, can have behaviors that exhibit dramatic phase transitions at certain population thresholds. Moreover, the magnitudes of these thresholds can thwart attempts to use simulation, model checking, or approximation by differential equations to formally verify the behaviors of such systems at realistic populations. We sho… ▽ More

    Submitted 1 June, 2020; v1 submitted 11 September, 2019; originally announced September 2019.

    Comments: 30 pages, 3 figures

  16. arXiv:1902.06171  [pdf, ps, other

    cs.GT cs.ET cs.SE

    Robustness and Games Against Nature in Molecular Programming

    Authors: Jack H. Lutz, Neil Lutz, Robyn R. Lutz, Matthew R. Riley

    Abstract: Matter, especially DNA, is now programmed to carry out useful processes at the nanoscale. As these programs and processes become more complex and their envisioned safety-critical applications approach deployment, it is essential to develop methods for engineering trustworthiness into molecular programs. Some of this can be achieved by adapting existing software engineering methods, but molecular p… ▽ More

    Submitted 16 February, 2019; originally announced February 2019.

  17. arXiv:1710.09494  [pdf, other

    cs.ET

    Runtime Fault Detection in Programmed Molecular Systems

    Authors: Samuel J. Ellis, Titus H. Klinge, James I. Lathrop, Jack H. Lutz, Robyn R. Lutz, Andrew S. Miner, Hugh D. Potter

    Abstract: Watchdog timers are devices that are commonly used to monitor the health of safety-critical hardware and software systems. Their primary function is to raise an alarm if the monitored systems fail to emit periodic "heartbeats" that signal their well-being. In this paper we design and verify a molecular watchdog timer for monitoring the health of programmed molecular nanosystems. This raises new ch… ▽ More

    Submitted 23 July, 2018; v1 submitted 25 October, 2017; originally announced October 2017.

  18. arXiv:1601.01278  [pdf, other

    cs.CR cs.NI

    Security and Privacy in Future Internet Architectures - Benefits and Challenges of Content Centric Networks

    Authors: Roman Lutz

    Abstract: As the shortcomings of our current Internet become more and more obvious, researchers have started creating alternative approaches for the Internet of the future. Their design goals are mainly content-orientation, security, support for mobility and cloud computing. The probably most popular architecture is called Content Centric Networking. Every communication is treated as a distribution of conte… ▽ More

    Submitted 13 January, 2016; v1 submitted 6 January, 2016; originally announced January 2016.

    Comments: 11 pages

    ACM Class: C.2.1

  19. arXiv:1601.00574  [pdf, other

    cs.LG

    NFL Play Prediction

    Authors: Brendan Teich, Roman Lutz, Valentin Kassarnig

    Abstract: Based on NFL game data we try to predict the outcome of a play in multiple different ways. An application of this is the following: by plugging in various play options one could determine the best play for a given situation in real time. While the outcome of a play can be described in many ways we had the most promising results with a newly defined measure that we call "progress". We see this work… ▽ More

    Submitted 4 January, 2016; originally announced January 2016.

    Comments: 14 pages

  20. arXiv:1505.06918  [pdf, other

    cs.LG

    Fantasy Football Prediction

    Authors: Roman Lutz

    Abstract: The ubiquity of professional sports and specifically the NFL have lead to an increase in popularity for Fantasy Football. Users have many tools at their disposal: statistics, predictions, rankings of experts and even recommendations of peers. There are issues with all of these, though. Especially since many people pay money to play, the prediction tools should be enhanced as they provide unbiased… ▽ More

    Submitted 26 May, 2015; originally announced May 2015.

    Comments: class project, 7 pages (1 sources, 1 appendix)

    ACM Class: I.2.6