SlideShare a Scribd company logo
Confidence Composition (CoCo) for
Monitors of Verification Assumptions
Ivan Ruchkin, Matthew Cleaveland, Radoslav Ivanov*,
Pengyuan Lu, Taylor Carpenter, Oleg Sokolsky, Insup Lee
Computer and Information Science Department
University of Pennsylvania
13th
ACM/IEEE Intl. Conf. on Cyber-Physical Systems
CPS-IoT Week
May the 4th, 2022
* Now @ RPI CS
2
Req: no obstacle collisions
Req: no pipeline loss
Detection
confidence
Dynamics
confidence Detection
confidence
Distance d
Position y
Motivation: unmanned underwater vehicle (UUV)
— Build a comprehensive model
○ Bayesian/Markov networks [Pearl’88, Koller’09]
Our goal: combine run-time confidences into a predictive probability of safety
Existing work:
— Aggregate predictions of the same phenomenon
○ Forecast combination and ensemble learning[Ranjan’10, Sagi’18]
Motivation: unmanned underwater vehicle (UUV)
3
Req: no obstacle collisions
Req: no pipeline loss
Detection
confidence
Distance d
Position y
Dynamics
confidence Detection
confidence
→ but we have different phenomena
→ but requires dependencies between confidences
- Key concepts: verification assumptions, confidence monitors
- CoCo: a confidence composition framework
- Confidence calibration bounds
- Experimental results for UUV
- Key concepts: verification assumptions, confidence monitors
- CoCo: a confidence composition framework
- Confidence calibration bounds
- Experimental results for UUV
Agenda
4
Challenge: fragmented guarantees & monitors
5
Sensor
data
Control
NN
Perception
NN
Dynamics
Simulation
Confidence
monitor
Closed-loop
NN
verification
?
?
“Safe”
Confidence
monitor
Assumptions relate guarantees & monitors
6
Sensor
data
Assn 1
Assn 2
Monitor of
Assn 1
Monitor of
Assn 2
Sufficient
“Safe”
Dynamics
Simulation
Control
NN
Perception
NN
Closed-loop
NN
verification
— Discrete-output monitors: “Yes”, “No”, “Maybe” via sequential detection [Scharf’91, Poor’13]
— Limitations of discrete assumption monitoring:
○ Too coarse for highly uncertain assumptions → uninformative
○ Errors accumulate combinatorially → decreased performance [Ruchkin’20]
How to monitor assumptions?
7
— Key idea: Confidence monitoring instead of discrete monitoring [Ruchkin’21]
○ Confidence C in assumption A is an estimate of Pr(A)
○ Expected calibration error (ECE) for confidence C predicting satisfaction of A:
▹ ECE(C, A) = E[| Pr( A | C ) - C |]
Assumptions relate guarantees & monitors
8
Sensor
data
Assn 1
Assn 2
“Safe”
Dynamics
Simulation
Control
NN
Perception
NN
Closed-loop
NN
verification
Monitor of
Assn 1
Monitor of
Assn 2
Sufficient
- Key concepts: verification assumptions, confidence monitors
- CoCo: a confidence composition framework
- Confidence calibration bounds
- Experimental results for UUV
- Key concepts: verification assumptions, confidence monitors
- CoCo: a confidence composition framework
- Confidence calibration bounds
- Experimental results for UUV
Agenda
9
Confidence composition (CoCo) framework
10
Design-time phase Run-time phase
Safety requirement
“In next 30s, track pipe unless avoiding obstacles”
□30
( d ≥ 5 ∧ (d ≥ 30 → 10 ≤ y ≤ 50) )
Dynamics
NN controller
Environment
Perception
Model
Closed-loop
NN verification
Confidence in the
safety guarantees
Confidence composition (CoCo) framework
11
Safety requirement
“In next 30s, track pipe unless avoiding obstacles”
□30
( d ≥ 5 ∧ (d ≥ 30 → 10 ≤ y ≤ 50) )
Dynamics
NN controller
Environment
Perception
A1: “The obstacle is far enough
(d ≥ 30)”
A2: “Currently tracking the pipe
(10 ≤ y ≤ 50)”
A3: “Our observations are
consistent with the dynamics”
A4: “Perception noise is
within known bounds”
Model
Assumption confidence monitors
Obstacle monitor M1
Model invalidator M3
Pipe monitor M2
M4
c1
c2
c3
c4
C = f(M1, M2, M3, M4)
Confidence composition
“Safe”
Closed-loop
NN verification
Combined assumptions
(A1 → A2) ∧ A3 ∧ A4
Design-time phase Run-time phase
M2
M1
M3
M4
How to compose confidences?
12
C = f(M1, M2, M3, M4)
Composed confidence
M2
M1
M3
M4
A2
A1
A3
A4
A = (A1 → A2) ∧ A3 ∧ A4
Combined assumptions
Verification
Given: calibrated monitors
ECE(M1, A1) ≤ e 1
, …
Safety outcome
S ∈ { , } Goal: calibrate C to S
ECE(C, S) ≤ e
Theorem: the Goal is achieved if
C is calibrated to A: ECE(C, A) ≤ g(e)
Monitors have
- Unknown dependencies
- Idiosyncratic inaccuracies
ECE(M1*M2, A1∧A2) ≤ max[4e1
e2
, (Var[M1]*Var[M2])0.5
+ e1
+ e2
+ e1
e2
]
ECE(w1
*M1+w2
*M2, A1∧A2) ≤ max[e1
+ e2
+ e1
e2
, max[w1
, w2
] + e1
+ e2
− e1
e2
]
How to compose confidences?
13
C = f(M1, M2, M3, M4)
Composed confidence
M2
M1
M3
M4
A2
A1
A3
A4
A = (A1 → A2) ∧ A3 ∧ A4
Combined assumptions
Given: calibrated monitors
ECE(M1, A1) ≤ e 1
, …
Pr( )=?
Problem: conjunctive composition of ECEs
Given: ECE(M1, A1) ≤ e1
, ECE(M2, A2) ≤ e2
Find: f, ef
s.t. ECE(f(M1, M2), A1 ∧ A2) ≤ ef
Two data-free candidates for f:
Monitors have
- Unknown dependencies
- Idiosyncratic inaccuracies
Theorem: the Goal is achieved if
C is calibrated to A: ECE(C, A) ≤ g(e)
Two data-driven candidates: logistic regression, Bayesian estimation
ECE(C, S) ≤ e
- Key concepts: verification assumptions, confidence monitors
- CoCo: a confidence composition framework
- Confidence calibration bounds
- Experimental results for UUV
- Key concepts: verification assumptions, confidence monitors
- CoCo: a confidence composition framework
- Confidence calibration bounds
- Experimental results for UUV
Agenda
14
— Case study setup: 194 simulated UUV executions
○ Random independent violations of assumptions
— Composed confidence
○ Improves calibration to safety over individual monitors
Confidence composition is useful in practice
15
— Another case study: mountain car
○ Similar outcomes, see paper
I. Algorithmic confidence composition
— Synthesizing assumptions and monitors
— Composing confidence for arbitrary propositional formulas
— Minimizing ECE for a family of composition functions
II. More accurate and optimistic confidence
— Incorporating offline testing/simulation data and online predictions
III. Confidence-based recovery with probabilistic guarantees
This paper enables interesting future work
16
— CoCo framework for composing confidence monitors of verification assumptions
— First compositional bounds for calibration error
— Useful predictor of run-time safety, as seen in two case studies
Talk summary
17
A2
A1
A3
A4
(A1 → A2) ∧ A3 ∧ A4 f(M1, M2, M3, M4)
M2
M1
M3
M4
https://github.com/bisc/coco-case-studies
— [Pearl’88] Pearl. Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann, 1988.
— [Scharf’91] Scharf. Statistical Signal Processing. Pearson, 1991.
— [Koller’09] Koller, Friedman, Bach. Probabilistic Graphical Models: Principles and Techniques. MIT Press, 2009.
— [Ranjan’10] Ranjan, Gneiting. Combining probability forecasts. In the Journal of the Royal Statistical Society, 2010.
— [Poor’13] Poor. An Introduction to Signal Detection and Estimation. Springer, 2013.
— [Sagi’18] Sagi, Rokach. Ensemble learning: A survey. In Wiley Interdisciplinary Reviews, 2018.
— [Ruchkin’20] Ruchkin, Sokolsky, Weimer, Hedaoo, Lee. Compositional Probabilistic Analysis of Temporal Properties Over
Stochastic Detectors. In EMSOFT, 2020.
— [Ruchkin’21] Ruchkin, Cleaveland, Sokolsky, Lee. Confidence Monitoring and Composition for Dynamic Assurance of
Learning-Enabled Autonomous Systems. In Formal Methods in Outer Space, 2021.
References
18

More Related Content

Similar to Confidence Composition for Monitors of Verification Assumptions

Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Ivan Ruchkin
 
Number of iterations needed in Monte Carlo Simulation using reliability analy...
Number of iterations needed in Monte Carlo Simulation using reliability analy...Number of iterations needed in Monte Carlo Simulation using reliability analy...
Number of iterations needed in Monte Carlo Simulation using reliability analy...
IJERA Editor
 
Poster: Contract-Based Integration of Cyber-Physical Analyses
Poster: Contract-Based Integration of Cyber-Physical AnalysesPoster: Contract-Based Integration of Cyber-Physical Analyses
Poster: Contract-Based Integration of Cyber-Physical Analyses
Ivan Ruchkin
 
Model predictive-fuzzy-control-of-air-ratio-for-automotive-engines
Model predictive-fuzzy-control-of-air-ratio-for-automotive-enginesModel predictive-fuzzy-control-of-air-ratio-for-automotive-engines
Model predictive-fuzzy-control-of-air-ratio-for-automotive-engines
pace130557
 
Innovate with confidence – Functional Verification of Embedded Algorithms
Innovate with confidence – Functional Verification of Embedded AlgorithmsInnovate with confidence – Functional Verification of Embedded Algorithms
Innovate with confidence – Functional Verification of Embedded Algorithms
Joachim Schlosser
 
Seminar pasqualina potena
Seminar pasqualina potenaSeminar pasqualina potena
Seminar pasqualina potena
fbk-das
 
Extended Kalman observer based sensor fault detection
Extended Kalman observer based sensor fault detectionExtended Kalman observer based sensor fault detection
Extended Kalman observer based sensor fault detection
IJECEIAES
 
Constraint-Based Fault-Localization
Constraint-Based Fault-LocalizationConstraint-Based Fault-Localization
Constraint-Based Fault-Localization
Mohammed Bekkouche
 
Static Analysis and Verification of C Programs
Static Analysis and Verification of C ProgramsStatic Analysis and Verification of C Programs
Experiment to determine a method for effortless static calibration of the ine...
Experiment to determine a method for effortless static calibration of the ine...Experiment to determine a method for effortless static calibration of the ine...
Experiment to determine a method for effortless static calibration of the ine...
IRJET Journal
 
Project seminar ppt_steelcasting
Project seminar ppt_steelcastingProject seminar ppt_steelcasting
Project seminar ppt_steelcasting
Rudra Narayan Paul
 
Optimal Energy Storage System Operation for Peak Reduction
Optimal Energy Storage System  Operation for Peak ReductionOptimal Energy Storage System  Operation for Peak Reduction
Optimal Energy Storage System Operation for Peak Reduction
Daisuke Kodaira
 
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...
Filip Krikava
 
Kk2518251830
Kk2518251830Kk2518251830
Kk2518251830
IJERA Editor
 
Kk2518251830
Kk2518251830Kk2518251830
Kk2518251830
IJERA Editor
 
Anomaly Detection in Temporal data Using Kmeans Clustering with C5.0
Anomaly Detection in Temporal data Using Kmeans Clustering with C5.0Anomaly Detection in Temporal data Using Kmeans Clustering with C5.0
Anomaly Detection in Temporal data Using Kmeans Clustering with C5.0
theijes
 
02 Modelling strategies for Nuclear Probabilistic Safety Assessment in case o...
02 Modelling strategies for Nuclear Probabilistic Safety Assessment in case o...02 Modelling strategies for Nuclear Probabilistic Safety Assessment in case o...
02 Modelling strategies for Nuclear Probabilistic Safety Assessment in case o...
RCCSRENKEI
 

Similar to Confidence Composition for Monitors of Verification Assumptions (20)

Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
 
Number of iterations needed in Monte Carlo Simulation using reliability analy...
Number of iterations needed in Monte Carlo Simulation using reliability analy...Number of iterations needed in Monte Carlo Simulation using reliability analy...
Number of iterations needed in Monte Carlo Simulation using reliability analy...
 
Poster: Contract-Based Integration of Cyber-Physical Analyses
Poster: Contract-Based Integration of Cyber-Physical AnalysesPoster: Contract-Based Integration of Cyber-Physical Analyses
Poster: Contract-Based Integration of Cyber-Physical Analyses
 
Model predictive-fuzzy-control-of-air-ratio-for-automotive-engines
Model predictive-fuzzy-control-of-air-ratio-for-automotive-enginesModel predictive-fuzzy-control-of-air-ratio-for-automotive-engines
Model predictive-fuzzy-control-of-air-ratio-for-automotive-engines
 
Innovate with confidence – Functional Verification of Embedded Algorithms
Innovate with confidence – Functional Verification of Embedded AlgorithmsInnovate with confidence – Functional Verification of Embedded Algorithms
Innovate with confidence – Functional Verification of Embedded Algorithms
 
Seminar pasqualina potena
Seminar pasqualina potenaSeminar pasqualina potena
Seminar pasqualina potena
 
Extended Kalman observer based sensor fault detection
Extended Kalman observer based sensor fault detectionExtended Kalman observer based sensor fault detection
Extended Kalman observer based sensor fault detection
 
Constraint-Based Fault-Localization
Constraint-Based Fault-LocalizationConstraint-Based Fault-Localization
Constraint-Based Fault-Localization
 
Static Analysis and Verification of C Programs
Static Analysis and Verification of C ProgramsStatic Analysis and Verification of C Programs
Static Analysis and Verification of C Programs
 
Experiment to determine a method for effortless static calibration of the ine...
Experiment to determine a method for effortless static calibration of the ine...Experiment to determine a method for effortless static calibration of the ine...
Experiment to determine a method for effortless static calibration of the ine...
 
Licentiate Presentation
Licentiate PresentationLicentiate Presentation
Licentiate Presentation
 
Project seminar ppt_steelcasting
Project seminar ppt_steelcastingProject seminar ppt_steelcasting
Project seminar ppt_steelcasting
 
unischeduler_pakdd_v3
unischeduler_pakdd_v3unischeduler_pakdd_v3
unischeduler_pakdd_v3
 
Optimal Energy Storage System Operation for Peak Reduction
Optimal Energy Storage System  Operation for Peak ReductionOptimal Energy Storage System  Operation for Peak Reduction
Optimal Energy Storage System Operation for Peak Reduction
 
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...
 
Kk2518251830
Kk2518251830Kk2518251830
Kk2518251830
 
Kk2518251830
Kk2518251830Kk2518251830
Kk2518251830
 
Anomaly Detection in Temporal data Using Kmeans Clustering with C5.0
Anomaly Detection in Temporal data Using Kmeans Clustering with C5.0Anomaly Detection in Temporal data Using Kmeans Clustering with C5.0
Anomaly Detection in Temporal data Using Kmeans Clustering with C5.0
 
Report
ReportReport
Report
 
02 Modelling strategies for Nuclear Probabilistic Safety Assessment in case o...
02 Modelling strategies for Nuclear Probabilistic Safety Assessment in case o...02 Modelling strategies for Nuclear Probabilistic Safety Assessment in case o...
02 Modelling strategies for Nuclear Probabilistic Safety Assessment in case o...
 

More from Ivan Ruchkin

Language-Enhanced Latent Representations for Out-of-Distribution Detection in...
Language-Enhanced Latent Representations for Out-of-Distribution Detection in...Language-Enhanced Latent Representations for Out-of-Distribution Detection in...
Language-Enhanced Latent Representations for Out-of-Distribution Detection in...
Ivan Ruchkin
 
​Poster: Zero-shot Safety Prediction for Autonomous Robots with Foundation Wo...
​Poster: Zero-shot Safety Prediction for Autonomous Robots with Foundation Wo...​Poster: Zero-shot Safety Prediction for Autonomous Robots with Foundation Wo...
​Poster: Zero-shot Safety Prediction for Autonomous Robots with Foundation Wo...
Ivan Ruchkin
 
Curating Naturally Adversarial Datasets for Learning-Enabled Medical Cyber-Ph...
Curating Naturally Adversarial Datasets for Learning-Enabled Medical Cyber-Ph...Curating Naturally Adversarial Datasets for Learning-Enabled Medical Cyber-Ph...
Curating Naturally Adversarial Datasets for Learning-Enabled Medical Cyber-Ph...
Ivan Ruchkin
 
Repairing Learning-Enabled Controllers While Preserving What Works
Repairing Learning-Enabled Controllers While Preserving What WorksRepairing Learning-Enabled Controllers While Preserving What Works
Repairing Learning-Enabled Controllers While Preserving What Works
Ivan Ruchkin
 
Poster: Conservative Safety Monitors of Stochastic Dynamical Systems
Poster: Conservative Safety Monitors of Stochastic Dynamical SystemsPoster: Conservative Safety Monitors of Stochastic Dynamical Systems
Poster: Conservative Safety Monitors of Stochastic Dynamical Systems
Ivan Ruchkin
 
Poster: How Safe Am I Given What I See? Calibrated Prediction of Safety Chanc...
Poster: How Safe Am I Given What I See? Calibrated Prediction of Safety Chanc...Poster: How Safe Am I Given What I See? Calibrated Prediction of Safety Chanc...
Poster: How Safe Am I Given What I See? Calibrated Prediction of Safety Chanc...
Ivan Ruchkin
 
Causal Repair of Learning-Enabled Cyber-physical Systems
Causal Repair of Learning-Enabled Cyber-physical SystemsCausal Repair of Learning-Enabled Cyber-physical Systems
Causal Repair of Learning-Enabled Cyber-physical Systems
Ivan Ruchkin
 
Conservative Safety Monitors of Stochastic Dynamical Systems
Conservative Safety Monitors of Stochastic Dynamical SystemsConservative Safety Monitors of Stochastic Dynamical Systems
Conservative Safety Monitors of Stochastic Dynamical Systems
Ivan Ruchkin
 
High-Confidence Data Programming for Evaluating Suppression of Physiological ...
High-Confidence Data Programming for Evaluating Suppression of Physiological ...High-Confidence Data Programming for Evaluating Suppression of Physiological ...
High-Confidence Data Programming for Evaluating Suppression of Physiological ...
Ivan Ruchkin
 
Data Generation with PROSPECT: a Probability Specification Tool
Data Generation with PROSPECT: a Probability Specification ToolData Generation with PROSPECT: a Probability Specification Tool
Data Generation with PROSPECT: a Probability Specification Tool
Ivan Ruchkin
 
Confidence Composition (CoCo) for Dynamic Assurance of Learning-Enabled Auton...
Confidence Composition (CoCo) for Dynamic Assurance of Learning-Enabled Auton...Confidence Composition (CoCo) for Dynamic Assurance of Learning-Enabled Auton...
Confidence Composition (CoCo) for Dynamic Assurance of Learning-Enabled Auton...
Ivan Ruchkin
 
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Ivan Ruchkin
 
On the Role of Assumptions in Engineering Smart Systems
On the Role of Assumptions in Engineering Smart SystemsOn the Role of Assumptions in Engineering Smart Systems
On the Role of Assumptions in Engineering Smart Systems
Ivan Ruchkin
 
Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...
Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...
Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...
Ivan Ruchkin
 
Overview of Epidemic Models for COVID-19
Overview of Epidemic Models for COVID-19Overview of Epidemic Models for COVID-19
Overview of Epidemic Models for COVID-19
Ivan Ruchkin
 
Thesis Defense: Integration of Modeling Methods for Cyber-Physical Systems
Thesis Defense: Integration of Modeling Methods for Cyber-Physical SystemsThesis Defense: Integration of Modeling Methods for Cyber-Physical Systems
Thesis Defense: Integration of Modeling Methods for Cyber-Physical Systems
Ivan Ruchkin
 
Towards a Formal Framework for Hybrid Planning in Self-Adaptation
Towards a Formal Framework for Hybrid Planning in Self-AdaptationTowards a Formal Framework for Hybrid Planning in Self-Adaptation
Towards a Formal Framework for Hybrid Planning in Self-Adaptation
Ivan Ruchkin
 
IPL: An Integration Property Language for Multi-Model Cyber-Physical Systems
IPL: An Integration Property Language for Multi-Model Cyber-Physical SystemsIPL: An Integration Property Language for Multi-Model Cyber-Physical Systems
IPL: An Integration Property Language for Multi-Model Cyber-Physical Systems
Ivan Ruchkin
 
Inconsistencies in Models of Adaptive Service Robots
Inconsistencies in Models of Adaptive Service RobotsInconsistencies in Models of Adaptive Service Robots
Inconsistencies in Models of Adaptive Service Robots
Ivan Ruchkin
 
Challenges in Physical Modeling for Adaptation of Cyber-Physical Systems
Challenges in Physical Modeling for Adaptation of Cyber-Physical SystemsChallenges in Physical Modeling for Adaptation of Cyber-Physical Systems
Challenges in Physical Modeling for Adaptation of Cyber-Physical Systems
Ivan Ruchkin
 

More from Ivan Ruchkin (20)

Language-Enhanced Latent Representations for Out-of-Distribution Detection in...
Language-Enhanced Latent Representations for Out-of-Distribution Detection in...Language-Enhanced Latent Representations for Out-of-Distribution Detection in...
Language-Enhanced Latent Representations for Out-of-Distribution Detection in...
 
​Poster: Zero-shot Safety Prediction for Autonomous Robots with Foundation Wo...
​Poster: Zero-shot Safety Prediction for Autonomous Robots with Foundation Wo...​Poster: Zero-shot Safety Prediction for Autonomous Robots with Foundation Wo...
​Poster: Zero-shot Safety Prediction for Autonomous Robots with Foundation Wo...
 
Curating Naturally Adversarial Datasets for Learning-Enabled Medical Cyber-Ph...
Curating Naturally Adversarial Datasets for Learning-Enabled Medical Cyber-Ph...Curating Naturally Adversarial Datasets for Learning-Enabled Medical Cyber-Ph...
Curating Naturally Adversarial Datasets for Learning-Enabled Medical Cyber-Ph...
 
Repairing Learning-Enabled Controllers While Preserving What Works
Repairing Learning-Enabled Controllers While Preserving What WorksRepairing Learning-Enabled Controllers While Preserving What Works
Repairing Learning-Enabled Controllers While Preserving What Works
 
Poster: Conservative Safety Monitors of Stochastic Dynamical Systems
Poster: Conservative Safety Monitors of Stochastic Dynamical SystemsPoster: Conservative Safety Monitors of Stochastic Dynamical Systems
Poster: Conservative Safety Monitors of Stochastic Dynamical Systems
 
Poster: How Safe Am I Given What I See? Calibrated Prediction of Safety Chanc...
Poster: How Safe Am I Given What I See? Calibrated Prediction of Safety Chanc...Poster: How Safe Am I Given What I See? Calibrated Prediction of Safety Chanc...
Poster: How Safe Am I Given What I See? Calibrated Prediction of Safety Chanc...
 
Causal Repair of Learning-Enabled Cyber-physical Systems
Causal Repair of Learning-Enabled Cyber-physical SystemsCausal Repair of Learning-Enabled Cyber-physical Systems
Causal Repair of Learning-Enabled Cyber-physical Systems
 
Conservative Safety Monitors of Stochastic Dynamical Systems
Conservative Safety Monitors of Stochastic Dynamical SystemsConservative Safety Monitors of Stochastic Dynamical Systems
Conservative Safety Monitors of Stochastic Dynamical Systems
 
High-Confidence Data Programming for Evaluating Suppression of Physiological ...
High-Confidence Data Programming for Evaluating Suppression of Physiological ...High-Confidence Data Programming for Evaluating Suppression of Physiological ...
High-Confidence Data Programming for Evaluating Suppression of Physiological ...
 
Data Generation with PROSPECT: a Probability Specification Tool
Data Generation with PROSPECT: a Probability Specification ToolData Generation with PROSPECT: a Probability Specification Tool
Data Generation with PROSPECT: a Probability Specification Tool
 
Confidence Composition (CoCo) for Dynamic Assurance of Learning-Enabled Auton...
Confidence Composition (CoCo) for Dynamic Assurance of Learning-Enabled Auton...Confidence Composition (CoCo) for Dynamic Assurance of Learning-Enabled Auton...
Confidence Composition (CoCo) for Dynamic Assurance of Learning-Enabled Auton...
 
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
 
On the Role of Assumptions in Engineering Smart Systems
On the Role of Assumptions in Engineering Smart SystemsOn the Role of Assumptions in Engineering Smart Systems
On the Role of Assumptions in Engineering Smart Systems
 
Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...
Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...
Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...
 
Overview of Epidemic Models for COVID-19
Overview of Epidemic Models for COVID-19Overview of Epidemic Models for COVID-19
Overview of Epidemic Models for COVID-19
 
Thesis Defense: Integration of Modeling Methods for Cyber-Physical Systems
Thesis Defense: Integration of Modeling Methods for Cyber-Physical SystemsThesis Defense: Integration of Modeling Methods for Cyber-Physical Systems
Thesis Defense: Integration of Modeling Methods for Cyber-Physical Systems
 
Towards a Formal Framework for Hybrid Planning in Self-Adaptation
Towards a Formal Framework for Hybrid Planning in Self-AdaptationTowards a Formal Framework for Hybrid Planning in Self-Adaptation
Towards a Formal Framework for Hybrid Planning in Self-Adaptation
 
IPL: An Integration Property Language for Multi-Model Cyber-Physical Systems
IPL: An Integration Property Language for Multi-Model Cyber-Physical SystemsIPL: An Integration Property Language for Multi-Model Cyber-Physical Systems
IPL: An Integration Property Language for Multi-Model Cyber-Physical Systems
 
Inconsistencies in Models of Adaptive Service Robots
Inconsistencies in Models of Adaptive Service RobotsInconsistencies in Models of Adaptive Service Robots
Inconsistencies in Models of Adaptive Service Robots
 
Challenges in Physical Modeling for Adaptation of Cyber-Physical Systems
Challenges in Physical Modeling for Adaptation of Cyber-Physical SystemsChallenges in Physical Modeling for Adaptation of Cyber-Physical Systems
Challenges in Physical Modeling for Adaptation of Cyber-Physical Systems
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

Confidence Composition for Monitors of Verification Assumptions

  • 1. Confidence Composition (CoCo) for Monitors of Verification Assumptions Ivan Ruchkin, Matthew Cleaveland, Radoslav Ivanov*, Pengyuan Lu, Taylor Carpenter, Oleg Sokolsky, Insup Lee Computer and Information Science Department University of Pennsylvania 13th ACM/IEEE Intl. Conf. on Cyber-Physical Systems CPS-IoT Week May the 4th, 2022 * Now @ RPI CS
  • 2. 2 Req: no obstacle collisions Req: no pipeline loss Detection confidence Dynamics confidence Detection confidence Distance d Position y Motivation: unmanned underwater vehicle (UUV)
  • 3. — Build a comprehensive model ○ Bayesian/Markov networks [Pearl’88, Koller’09] Our goal: combine run-time confidences into a predictive probability of safety Existing work: — Aggregate predictions of the same phenomenon ○ Forecast combination and ensemble learning[Ranjan’10, Sagi’18] Motivation: unmanned underwater vehicle (UUV) 3 Req: no obstacle collisions Req: no pipeline loss Detection confidence Distance d Position y Dynamics confidence Detection confidence → but we have different phenomena → but requires dependencies between confidences
  • 4. - Key concepts: verification assumptions, confidence monitors - CoCo: a confidence composition framework - Confidence calibration bounds - Experimental results for UUV - Key concepts: verification assumptions, confidence monitors - CoCo: a confidence composition framework - Confidence calibration bounds - Experimental results for UUV Agenda 4
  • 5. Challenge: fragmented guarantees & monitors 5 Sensor data Control NN Perception NN Dynamics Simulation Confidence monitor Closed-loop NN verification ? ? “Safe” Confidence monitor
  • 6. Assumptions relate guarantees & monitors 6 Sensor data Assn 1 Assn 2 Monitor of Assn 1 Monitor of Assn 2 Sufficient “Safe” Dynamics Simulation Control NN Perception NN Closed-loop NN verification
  • 7. — Discrete-output monitors: “Yes”, “No”, “Maybe” via sequential detection [Scharf’91, Poor’13] — Limitations of discrete assumption monitoring: ○ Too coarse for highly uncertain assumptions → uninformative ○ Errors accumulate combinatorially → decreased performance [Ruchkin’20] How to monitor assumptions? 7 — Key idea: Confidence monitoring instead of discrete monitoring [Ruchkin’21] ○ Confidence C in assumption A is an estimate of Pr(A) ○ Expected calibration error (ECE) for confidence C predicting satisfaction of A: ▹ ECE(C, A) = E[| Pr( A | C ) - C |]
  • 8. Assumptions relate guarantees & monitors 8 Sensor data Assn 1 Assn 2 “Safe” Dynamics Simulation Control NN Perception NN Closed-loop NN verification Monitor of Assn 1 Monitor of Assn 2 Sufficient
  • 9. - Key concepts: verification assumptions, confidence monitors - CoCo: a confidence composition framework - Confidence calibration bounds - Experimental results for UUV - Key concepts: verification assumptions, confidence monitors - CoCo: a confidence composition framework - Confidence calibration bounds - Experimental results for UUV Agenda 9
  • 10. Confidence composition (CoCo) framework 10 Design-time phase Run-time phase Safety requirement “In next 30s, track pipe unless avoiding obstacles” □30 ( d ≥ 5 ∧ (d ≥ 30 → 10 ≤ y ≤ 50) ) Dynamics NN controller Environment Perception Model Closed-loop NN verification
  • 11. Confidence in the safety guarantees Confidence composition (CoCo) framework 11 Safety requirement “In next 30s, track pipe unless avoiding obstacles” □30 ( d ≥ 5 ∧ (d ≥ 30 → 10 ≤ y ≤ 50) ) Dynamics NN controller Environment Perception A1: “The obstacle is far enough (d ≥ 30)” A2: “Currently tracking the pipe (10 ≤ y ≤ 50)” A3: “Our observations are consistent with the dynamics” A4: “Perception noise is within known bounds” Model Assumption confidence monitors Obstacle monitor M1 Model invalidator M3 Pipe monitor M2 M4 c1 c2 c3 c4 C = f(M1, M2, M3, M4) Confidence composition “Safe” Closed-loop NN verification Combined assumptions (A1 → A2) ∧ A3 ∧ A4 Design-time phase Run-time phase M2 M1 M3 M4
  • 12. How to compose confidences? 12 C = f(M1, M2, M3, M4) Composed confidence M2 M1 M3 M4 A2 A1 A3 A4 A = (A1 → A2) ∧ A3 ∧ A4 Combined assumptions Verification Given: calibrated monitors ECE(M1, A1) ≤ e 1 , … Safety outcome S ∈ { , } Goal: calibrate C to S ECE(C, S) ≤ e Theorem: the Goal is achieved if C is calibrated to A: ECE(C, A) ≤ g(e) Monitors have - Unknown dependencies - Idiosyncratic inaccuracies
  • 13. ECE(M1*M2, A1∧A2) ≤ max[4e1 e2 , (Var[M1]*Var[M2])0.5 + e1 + e2 + e1 e2 ] ECE(w1 *M1+w2 *M2, A1∧A2) ≤ max[e1 + e2 + e1 e2 , max[w1 , w2 ] + e1 + e2 − e1 e2 ] How to compose confidences? 13 C = f(M1, M2, M3, M4) Composed confidence M2 M1 M3 M4 A2 A1 A3 A4 A = (A1 → A2) ∧ A3 ∧ A4 Combined assumptions Given: calibrated monitors ECE(M1, A1) ≤ e 1 , … Pr( )=? Problem: conjunctive composition of ECEs Given: ECE(M1, A1) ≤ e1 , ECE(M2, A2) ≤ e2 Find: f, ef s.t. ECE(f(M1, M2), A1 ∧ A2) ≤ ef Two data-free candidates for f: Monitors have - Unknown dependencies - Idiosyncratic inaccuracies Theorem: the Goal is achieved if C is calibrated to A: ECE(C, A) ≤ g(e) Two data-driven candidates: logistic regression, Bayesian estimation ECE(C, S) ≤ e
  • 14. - Key concepts: verification assumptions, confidence monitors - CoCo: a confidence composition framework - Confidence calibration bounds - Experimental results for UUV - Key concepts: verification assumptions, confidence monitors - CoCo: a confidence composition framework - Confidence calibration bounds - Experimental results for UUV Agenda 14
  • 15. — Case study setup: 194 simulated UUV executions ○ Random independent violations of assumptions — Composed confidence ○ Improves calibration to safety over individual monitors Confidence composition is useful in practice 15 — Another case study: mountain car ○ Similar outcomes, see paper
  • 16. I. Algorithmic confidence composition — Synthesizing assumptions and monitors — Composing confidence for arbitrary propositional formulas — Minimizing ECE for a family of composition functions II. More accurate and optimistic confidence — Incorporating offline testing/simulation data and online predictions III. Confidence-based recovery with probabilistic guarantees This paper enables interesting future work 16
  • 17. — CoCo framework for composing confidence monitors of verification assumptions — First compositional bounds for calibration error — Useful predictor of run-time safety, as seen in two case studies Talk summary 17 A2 A1 A3 A4 (A1 → A2) ∧ A3 ∧ A4 f(M1, M2, M3, M4) M2 M1 M3 M4 https://github.com/bisc/coco-case-studies
  • 18. — [Pearl’88] Pearl. Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann, 1988. — [Scharf’91] Scharf. Statistical Signal Processing. Pearson, 1991. — [Koller’09] Koller, Friedman, Bach. Probabilistic Graphical Models: Principles and Techniques. MIT Press, 2009. — [Ranjan’10] Ranjan, Gneiting. Combining probability forecasts. In the Journal of the Royal Statistical Society, 2010. — [Poor’13] Poor. An Introduction to Signal Detection and Estimation. Springer, 2013. — [Sagi’18] Sagi, Rokach. Ensemble learning: A survey. In Wiley Interdisciplinary Reviews, 2018. — [Ruchkin’20] Ruchkin, Sokolsky, Weimer, Hedaoo, Lee. Compositional Probabilistic Analysis of Temporal Properties Over Stochastic Detectors. In EMSOFT, 2020. — [Ruchkin’21] Ruchkin, Cleaveland, Sokolsky, Lee. Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabled Autonomous Systems. In Formal Methods in Outer Space, 2021. References 18