{"id":"https://openalex.org/W4313563892","doi":"https://doi.org/10.1145/3551349.3559500","title":"Finding Property Violations through Network Falsification: Challenges, Adaptations and Lessons Learned from OpenPilot","display_name":"Finding Property Violations through Network Falsification: Challenges, Adaptations and Lessons Learned from OpenPilot","publication_year":2022,"publication_date":"2022-10-10","ids":{"openalex":"https://openalex.org/W4313563892","doi":"https://doi.org/10.1145/3551349.3559500"},"language":"en","primary_location":{"id":"doi:10.1145/3551349.3559500","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3551349.3559500","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3551349.3559500","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3551349.3559500","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037671969","display_name":"Meriel von Stein","orcid":"https://orcid.org/0000-0003-4641-4199"},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Meriel von Stein","raw_affiliation_strings":["University of Virginia, United States of America"],"affiliations":[{"raw_affiliation_string":"University of Virginia, United States of America","institution_ids":["https://openalex.org/I51556381"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025318877","display_name":"Sebastian Elbaum","orcid":"https://orcid.org/0000-0001-9592-1352"},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sebastian Elbaum","raw_affiliation_strings":["University of Virginia, United States of America"],"affiliations":[{"raw_affiliation_string":"University of Virginia, United States of America","institution_ids":["https://openalex.org/I51556381"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5037671969"],"corresponding_institution_ids":["https://openalex.org/I51556381"],"apc_list":null,"apc_paid":null,"fwci":0.694,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.76157682,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.9666000008583069,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9380000233650208,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.7123918533325195},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6923544406890869},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.6505134105682373},{"id":"https://openalex.org/keywords/cruise-control","display_name":"Cruise control","score":0.6135391592979431},{"id":"https://openalex.org/keywords/counterexample","display_name":"Counterexample","score":0.5102179050445557},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.4843112528324127},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4309823215007782},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38607606291770935},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34364283084869385},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.2842411994934082},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.2781168222427368}],"concepts":[{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.7123918533325195},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6923544406890869},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.6505134105682373},{"id":"https://openalex.org/C113168747","wikidata":"https://www.wikidata.org/wiki/Q507295","display_name":"Cruise control","level":3,"score":0.6135391592979431},{"id":"https://openalex.org/C162838799","wikidata":"https://www.wikidata.org/wiki/Q596077","display_name":"Counterexample","level":2,"score":0.5102179050445557},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.4843112528324127},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4309823215007782},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38607606291770935},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34364283084869385},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.2842411994934082},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.2781168222427368},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3551349.3559500","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3551349.3559500","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3551349.3559500","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3551349.3559500","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3551349.3559500","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3551349.3559500","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4300000071525574,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1154073153","display_name":null,"funder_award_id":"1924777","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G1523888516","display_name":null,"funder_award_id":"FA9550-","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"},{"id":"https://openalex.org/G4516736450","display_name":null,"funder_award_id":"-21-1-","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"},{"id":"https://openalex.org/G5809100787","display_name":null,"funder_award_id":"FA9550","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"},{"id":"https://openalex.org/G7650607359","display_name":null,"funder_award_id":"FA9550-21-1-0164","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320338279","display_name":"Air Force Office of Scientific Research","ror":"https://ror.org/011e9bt93"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4313563892.pdf"},"referenced_works_count":8,"referenced_works":["https://openalex.org/W1603878273","https://openalex.org/W2604347212","https://openalex.org/W2735260746","https://openalex.org/W2957905354","https://openalex.org/W3046712683","https://openalex.org/W3104284241","https://openalex.org/W3131407417","https://openalex.org/W3163395228"],"related_works":["https://openalex.org/W2349952486","https://openalex.org/W1489260687","https://openalex.org/W2775700832","https://openalex.org/W2587222766","https://openalex.org/W3204670144","https://openalex.org/W2163101548","https://openalex.org/W1988934358","https://openalex.org/W4389574038","https://openalex.org/W4293643564","https://openalex.org/W105332898"],"abstract_inverted_index":{"Openpilot":[0,26],"is":[1,41],"an":[2,76],"open":[3],"source":[4],"system":[5],"to":[6,35,43,50,74,94,116,123,133,155],"assist":[7],"drivers":[8],"by":[9],"providing":[10],"features":[11],"like":[12,161],"automated":[13],"lane":[14],"centering":[15],"and":[16,127,137],"adaptive":[17],"cruise":[18],"control.":[19],"Like":[20],"most":[21],"systems":[22,160],"for":[23,153],"autonomous":[24],"vehicles,":[25],"relies":[27],"on":[28,159],"a":[29,65,72,81,91],"sophisticated":[30],"deep":[31],"neural":[32],"network":[33,105],"(DNN)":[34],"provide":[36,138],"its":[37],"functionality,":[38],"one":[39],"that":[40,47,70,78],"susceptible":[42],"safety":[44,82],"property":[45,83,135],"violations":[46,56,136],"can":[48],"lead":[49],"crashes.":[51],"To":[52],"uncover":[53],"such":[54,114,125],"potential":[55,130,158],"before":[57],"deployment,":[58],"we":[59,86,142],"investigate":[60],"the":[61,88,95,110,129,144,150],"use":[62],"of":[63,67,90,131],"falsification,":[64],"form":[66],"directed":[68],"testing":[69],"analyzes":[71],"DNN":[73,96],"generate":[75],"input":[77],"will":[79],"cause":[80],"violation.":[84],"Specifically,":[85],"explore":[87],"application":[89],"state-of-the-art":[92],"falsifier":[93],"used":[97],"in":[98,104,112],"OpenPilot,":[99],"which":[100],"reflects":[101],"recent":[102],"trends":[103],"design.":[106],"Our":[107],"investigation":[108],"reveals":[109],"challenges":[111,152],"applying":[113],"falsifiers":[115,132,154],"real-world":[117],"DNNs,":[118],"conveys":[119],"our":[120],"engineering":[121],"efforts":[122],"overcome":[124],"challenges,":[126],"showcases":[128],"detect":[134],"meaningful":[139],"counterexamples.":[140],"Finally,":[141],"summarize":[143],"lessons":[145],"learned":[146],"as":[147,149],"well":[148],"pending":[151],"realize":[156],"their":[157],"OpenPilot.":[162]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
