{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T17:52:56Z","timestamp":1775065976386,"version":"3.50.1"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031067723","type":"print"},{"value":"9783031067730","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-06773-0_12","type":"book-chapter","created":{"date-parts":[[2022,5,19]],"date-time":"2022-05-19T11:24:44Z","timestamp":1652959484000},"page":"231-250","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["The Black-Box Simplex Architecture for\u00a0Runtime Assurance of\u00a0Autonomous CPS"],"prefix":"10.1007","author":[{"given":"Usama","family":"Mehmood","sequence":"first","affiliation":[]},{"given":"Sanaz","family":"Sheikhi","sequence":"additional","affiliation":[]},{"given":"Stanley","family":"Bak","sequence":"additional","affiliation":[]},{"given":"Scott A.","family":"Smolka","sequence":"additional","affiliation":[]},{"given":"Scott D.","family":"Stoller","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,20]]},"reference":[{"key":"12_CR1","doi-asserted-by":"publisher","unstructured":"Alsterda, J.P., Brown, M., Gerdes, J.C.: Contingency model predictive control for automated vehicles. In: 2019 American Control Conference (ACC), pp. 717\u2013722 (2019). https:\/\/doi.org\/10.23919\/ACC.2019.8815260","DOI":"10.23919\/ACC.2019.8815260"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Althoff, M., Dolan, J.M.: Online verification of automated road vehicles using reachability analysis. IEEE Trans. Robot. 30(4) (2014)","DOI":"10.1109\/TRO.2014.2312453"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Bak, S., Chivukula, D.K., Adekunle, O., Sun, M., Caccamo, M., Sha, L.: The system-level simplex architecture for improved real-time embedded system safety. In: 2009 15th IEEE Real-Time and Embedded Technology and Applications Symposium, pp. 99\u2013107. IEEE (2009)","DOI":"10.1109\/RTAS.2009.20"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Bak, S., Johnson, T.T., Caccamo, M., Sha, L.: Real-time reachability for verified simplex design. In: 35th IEEE Real-Time Systems Symposium (RTSS 2014). IEEE Computer Society, Rome, December 2014","DOI":"10.1109\/RTSS.2014.21"},{"key":"12_CR5","unstructured":"Bak, S., Liu, C., Johnson, T.: The second international verification of neural networks competition (VNN-COMP 2021): summary and results. arXiv preprint arXiv:2109.00498 (2021)"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Bak, S., Tran, H.D., Hobbs, K., Johnson, T.T.: Improved geometric path enumeration for verifying Relu neural networks. In: Proceedings of the 32nd International Conference on Computer Aided Verification (2020)","DOI":"10.1007\/978-3-030-53288-8_4"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Borrmann, U., Wang, L., Ames, A.D., Egerstedt, M.: Control barrier certificates for safe swarm behavior. In: Egerstedt, M., Wardi, Y. (eds.) ADHS. IFAC-PapersOnLine, vol. 48, pp. 68\u201373. Elsevier, Amsterdam (2015)","DOI":"10.1016\/j.ifacol.2015.11.154"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-642-39799-8_18","volume-title":"Computer Aided Verification","author":"X Chen","year":"2013","unstructured":"Chen, X., \u00c1brah\u00e1m, E., Sankaranarayanan, S.: Flow*: an analyzer for non-linear hybrid systems. In: Sharygina, N., Veith, H. (eds.) CAV 2013. LNCS, vol. 8044, pp. 258\u2013263. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39799-8_18"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Clark, M., et al.: A study on run time assurance for complex cyber physical systems. Technical report, Air Force Research Laboratory, Aerospace Systems Directorate (2013)","DOI":"10.21236\/ADA585474"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Desai, A., Ghosh, S., Seshia, S.A., Shankar, N., Tiwari, A.: SOTER: a runtime assurance framework for programming safe robotics systems. In: 49th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN 2019, Portland, OR, USA, 24\u201327 June 2019. IEEE (2019)","DOI":"10.1109\/DSN.2019.00027"},{"key":"12_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-540-31954-2_19","volume-title":"Hybrid Systems: Computation and Control","author":"A Girard","year":"2005","unstructured":"Girard, A.: Reachability of uncertain linear systems using zonotopes. In: Morari, M., Thiele, L. (eds.) HSCC 2005. LNCS, vol. 3414, pp. 291\u2013305. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/978-3-540-31954-2_19"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Gurriet, T., Mote, M., Ames, A.D., Feron, E.: An online approach to active set invariance. In: Conference on Decision and Control. IEEE (2018)","DOI":"10.1109\/CDC.2018.8619139"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Gurriet, T., Mote, M., Singletary, A., Feron, E., Ames, A.D.: A scalable controlled set invariance framework with practical safety guarantees. In: 2019 IEEE 58th Conference on Decision and Control (CDC), pp. 2046\u20132053. IEEE (2019)","DOI":"10.1109\/CDC40024.2019.9030159"},{"key":"12_CR14","unstructured":"Heidlauf, P., Collins, A., Bolender, M., Bak, S.: Verification challenges in f-16 ground collision avoidance and other automated maneuvers. In: 5th International Workshop on Applied Verification of Continuous and Hybrid Systems. EPiC Series in Computing, EasyChair (2018)"},{"issue":"3","key":"12_CR15","doi-asserted-by":"publisher","first-page":"598","DOI":"10.2514\/1.G003724","volume":"42","author":"KD Julian","year":"2019","unstructured":"Julian, K.D., Kochenderfer, M.J., Owen, M.P.: Deep neural network compression for aircraft collision avoidance systems. J. Guid. Control. Dyn. 42(3), 598\u2013608 (2019)","journal-title":"J. Guid. Control. Dyn."},{"key":"12_CR16","series-title":"Springer Proceedings in Mathematics & Statistics","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/978-3-319-12307-3_37","volume-title":"Interdisciplinary Topics in Applied Mathematics, Modeling and Computational Science","author":"J Kapinski","year":"2015","unstructured":"Kapinski, J., Deshmukh, J.: Discovering forward invariant sets for nonlinear dynamical systems. In: Cojocaru, M.G., Kotsireas, I.S., Makarov, R.N., Melnik, R.V.N., Shodiev, H. (eds.) Interdisciplinary Topics in Applied Mathematics, Modeling and Computational Science. SPMS, vol. 117, pp. 259\u2013264. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-12307-3_37"},{"key":"12_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-319-63387-9_5","volume-title":"Computer Aided Verification","author":"G Katz","year":"2017","unstructured":"Katz, G., Barrett, C., Dill, D.L., Julian, K., Kochenderfer, M.J.: Reluplex: an efficient SMT solver for verifying deep neural networks. In: Majumdar, R., Kun\u010dak, V. (eds.) CAV 2017. LNCS, vol. 10426, pp. 97\u2013117. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63387-9_5"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Kaynama, S., Maidens, J., Oishi, M., Mitchell, I.M., Dumont, G.A.: Computing the viability kernel using maximal reachable sets. In: Proceedings of the 15th ACM International Conference on Hybrid Systems: Computation and Control, pp. 55\u201364 (2012)","DOI":"10.1145\/2185632.2185644"},{"key":"12_CR19","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1007\/978-1-4613-8997-2_29","volume-title":"Autonomous Robot Vehicles","author":"O Khatib","year":"1986","unstructured":"Khatib, O.: Real-time obstacle avoidance for manipulators and mobile robots. In: Cox, I.J., Wilfong, G.T. (eds.) Autonomous Robot Vehicles, pp. 396\u2013404. Springer, New York (1986). https:\/\/doi.org\/10.1007\/978-1-4613-8997-2_29"},{"key":"12_CR20","unstructured":"Kochenderfer, M.J., Chryssanthacopoulos, J.: Robust airborne collision avoidance through dynamic programming. Project Report ATC-371 130, Lincoln Laboratory, Massachusetts Institute of Technology (2011)"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Lin, Q., Chen, X., Khurana, A., Dolan, J.: ReachFlow: an online safety assurance framework for waypoint-following of self-driving cars. In: 2020 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS) (2020)","DOI":"10.1109\/IROS45743.2020.9341122"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Magdici, S., Althoff, M.: Fail-safe motion planning of autonomous vehicles. In: 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), pp. 452\u2013458. IEEE (2016)","DOI":"10.1109\/ITSC.2016.7795594"},{"issue":"7","key":"12_CR23","doi-asserted-by":"publisher","first-page":"2017","DOI":"10.1016\/j.automatica.2013.03.020","volume":"49","author":"JN Maidens","year":"2013","unstructured":"Maidens, J.N., Kaynama, S., Mitchell, I.M., Oishi, M.M., Dumont, G.A.: Lagrangian methods for approximating the viability kernel in high-dimensional systems. Automatica 49(7), 2017\u20132029 (2013)","journal-title":"Automatica"},{"key":"12_CR24","unstructured":"Marston, M., Baca, G.: ACAS-Xu initial self-separation flight tests. Technical report, NASA (2015)"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Mashima, D., Chen, B., Zhou, T., Rajendran, R., Sikdar, B.: Securing substations through command authentication using on-the-fly simulation of power system dynamics. In: IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (2018)","DOI":"10.1109\/SmartGridComm.2018.8587604"},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"Mehmood, U., Bak, S., Smolka, S.A., Stoller, S.D.: Safe cps from unsafe controllers. In: Proceedings of the Workshop on Computation-Aware Algorithmic Design for Cyber-Physical Systems, pp. 26\u201328 (2021)","DOI":"10.1145\/3457335.3461712"},{"key":"12_CR27","unstructured":"Murray, R.M., Li, Z., Sastry, S.S., Sastry, S.S.: A Mathematical Introduction to Robotic Manipulation. CRC Press, Boca Raton (1994)"},{"key":"12_CR28","doi-asserted-by":"publisher","unstructured":"Lee, R., Jha, S., Mavridou, A., Giannakopoulou, D. (eds.): NFM 2020. LNCS, vol. 12229. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-55754-6","DOI":"10.1007\/978-3-030-55754-6"},{"key":"12_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-030-55754-6_6","volume-title":"NASA Formal Methods","author":"DT Phan","year":"2020","unstructured":"Phan, D.T., Grosu, R., Jansen, N., Paoletti, N., Smolka, S.A., Stoller, S.D.: Neural simplex architecture. In: Lee, R., Jha, S., Mavridou, A., Giannakopoulou, D. (eds.) NFM 2020. LNCS, vol. 12229, pp. 97\u2013114. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-55754-6_6"},{"issue":"1","key":"12_CR30","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/s10703-016-0265-4","volume":"51","author":"D Phan","year":"2017","unstructured":"Phan, D., Yang, J., Grosu, R., Smolka, S.A., Stoller, S.D.: Collision avoidance for mobile robots with limited sensing and limited information about moving obstacles. Formal Methods Syst. Des. 51(1), 62\u201386 (2017). https:\/\/doi.org\/10.1007\/s10703-016-0265-4","journal-title":"Formal Methods Syst. Des."},{"issue":"2","key":"12_CR31","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/BF01204182","volume":"29","author":"P Saint-Pierre","year":"1994","unstructured":"Saint-Pierre, P.: Approximation of the viability kernel. Appl. Math. Optim. 29(2), 187\u2013209 (1994)","journal-title":"Appl. Math. Optim."},{"key":"12_CR32","doi-asserted-by":"crossref","unstructured":"Schierman, J., et al.: Runtime assurance framework development for highly adaptive flight control systems. Report AD1010277, Defense Technical Information Center (2015)","DOI":"10.21236\/AD1010277"},{"key":"12_CR33","doi-asserted-by":"crossref","unstructured":"Schouwenaars, T., Valenti, M., Feron, E., How, J.: Implementation and flight test results of MILP-based UAV guidance. In: 2005 IEEE Aerospace Conference, pp. 1\u201313 (2005)","DOI":"10.1109\/AERO.2005.1559600"},{"key":"12_CR34","unstructured":"Schouwenaars, T.: Safe trajectory planning of autonomous vehicles. Ph.D. thesis, Massachusetts Institute of Technology (2006)"},{"key":"12_CR35","doi-asserted-by":"crossref","unstructured":"Schurmann, B., Klischat, M., Kochdumper, N., Althoff, M.: Formal safety net control using backward reachability analysis. IEEE Trans. Autom. Control (2021)","DOI":"10.1109\/TAC.2021.3124188"},{"key":"12_CR36","doi-asserted-by":"crossref","unstructured":"Seto, D., Krogh, B., Sha, L., Chutinan, A.: The simplex architecture for safe online control system upgrades. In: Proceedings of the 1998 American Control Conference. ACC (IEEE Cat. No. 98CH36207), vol. 6. IEEE (1998)","DOI":"10.1109\/ACC.1998.703255"},{"issue":"4","key":"12_CR37","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MS.2001.936213","volume":"18","author":"L Sha","year":"2001","unstructured":"Sha, L.: Using simplicity to control complexity. IEEE Softw. 18(4), 20\u201328 (2001). https:\/\/doi.org\/10.1109\/MS.2001.936213","journal-title":"IEEE Softw."},{"key":"12_CR38","unstructured":"Stevens, B.L., Lewis, F.L., Johnson, E.N.: Aircraft Control and Simulation. Wiley, New York (2015)"}],"container-title":["Lecture Notes in Computer Science","NASA Formal Methods"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-06773-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T11:10:09Z","timestamp":1659352209000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-06773-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031067723","9783031067730"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-06773-0_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"20 May 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NFM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"NASA Formal Methods Symposium","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pasadena, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 May 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 May 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nfm2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/shemesh.larc.nasa.gov\/nfm2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"118","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6.3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}