Automated online recognition of unexpected conditions is an indispensable component of autonomous vehicles to ensure safety even in unknown and uncertain situations. In this paper we propose a runtime monitoring technique rooted in the attention maps computed by explainable artificial intelligence techniques. Our approach, implemented in a tool called ThirdEye, turns attention maps into confidence scores that are used to discriminate safe from unsafe driving behaviours. The intuition is that uncommon attention maps are associated with unexpected runtime conditions.
In our empirical study, we evaluated the effectiveness of different configurations of ThirdEye at predicting simulation-based injected failures induced by both unknown conditions (adverse weather and lighting) and unsafe/uncertain conditions created with mutation testing. Results show that, overall, ThirdEye can predict 98% misbehaviours, up to three seconds in advance, outperforming a state-of-the-art failure predictor for autonomous vehicles.
Wed 12 OctDisplayed time zone: Eastern Time (US & Canada) change
10:00 - 12:00 | Technical Session 9 - Security and Privacy Research Papers / Industry Showcase at Ballroom C East Chair(s): Wei Yang University of Texas at Dallas | ||
10:00 20mResearch paper | Keeping Secrets: Multi-objective Genetic Improvement for Detecting and Reducing Information Leakage Research Papers Ibrahim Mesecan Iowa State University, Daniel Blackwell University College London, David Clark University College London, Myra Cohen Iowa State University, Justyna Petke University College London | ||
10:20 20mResearch paper | ThirdEye: Attention Maps for Safe Autonomous Driving Systems Research Papers Andrea Stocco Università della Svizzera italiana (USI), Paulo J. Nunes Federal University of Pernambuco, Marcelo d'Amorim Federal University of Pernambuco, Paolo Tonella USI Lugano DOI Pre-print | ||
10:40 20mIndustry talk | Finding Property Violations through Network Falsification: Challenges, Adaptations and Lessons Learned from OpenPilot Industry Showcase | ||
11:00 20mResearch paper | Scrutinizing Privacy Policy Compliance of Virtual Personal Assistant Apps Research Papers Fuman Xie University of Queensland, Yanjun Zhang University of Queensland, Chuan Yan University of Queensland, Suwan Li Nanjing University, Lei Bu Nanjing University, Kai Chen SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China, Zi Huang University of Queensland, Guangdong Bai University of Queensland | ||
11:20 20mResearch paper | An Empirical Study of Automation in Software Security Patch Management Research Papers Nesara Dissanayake University of Adelaide, Asangi Jayatilaka University of Adelaide, Mansooreh Zahedi The Univeristy of Melbourne, Muhammad Ali Babar University of Adelaide | ||
11:40 20mResearch paper | Are They Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions Research Papers Yuxi Ling National University of Singapore, Kailong Wang National University of Singapore, Guangdong Bai University of Queensland, Haoyu Wang Huazhong University of Science and Technology, China, Jin Song Dong National University of Singapore |