{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:06:05Z","timestamp":1755907565003,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T00:00:00Z","timestamp":1672876800000},"content-version":"vor","delay-in-days":87,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA9550-21-1-0164"],"award-info":[{"award-number":["FA9550-21-1-0164"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1924777"],"award-info":[{"award-number":["1924777"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,10]]},"DOI":"10.1145\/3551349.3559500","type":"proceedings-article","created":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T20:43:54Z","timestamp":1672951434000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Finding Property Violations through Network Falsification: Challenges, Adaptations and Lessons Learned from OpenPilot"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4641-4199","authenticated-orcid":false,"given":"Meriel","family":"von Stein","sequence":"first","affiliation":[{"name":"University of Virginia, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9592-1352","authenticated-orcid":false,"given":"Sebastian","family":"Elbaum","sequence":"additional","affiliation":[{"name":"University of Virginia, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2023,1,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63387-9_24"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70545-1_38"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-018-09509-5"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-53288-8_6"},{"key":"e_1_3_2_1_5_1","volume-title":"Eager Falsification for Accelerating Robustness Verification of Deep Neural Networks. In 2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE). IEEE, 345\u2013356","author":"Guo Xingwu","year":"2021","unstructured":"Xingwu Guo, Wenjie Wan, Zhaodi Zhang, Min Zhang, Fu Song, and Xuejun Wen. 2021. Eager Falsification for Accelerating Robustness Verification of Deep Neural Networks. In 2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE). IEEE, 345\u2013356."},{"key":"e_1_3_2_1_6_1","volume-title":"Scaling for 10X User Growth. comma.ai blog","author":"Hogan Greg","year":"2021","unstructured":"Greg Hogan. [2021]. Scaling for 10X User Growth. comma.ai blog (2021). https:\/\/blog.comma.ai\/scaling-for-10x-user-growth\/"},{"key":"e_1_3_2_1_7_1","volume-title":"Tesla is under investigation because its cars keep hitting emergency vehicles. CNN","author":"Isidore Chris","year":"2021","unstructured":"Chris Isidore and Peter Valdes-Dapena. 2021. Tesla is under investigation because its cars keep hitting emergency vehicles. CNN (2021). https:\/\/www.cnn.com\/2021\/08\/16\/business\/tesla-autopilot-federal-safety-probe\/index.html."},{"key":"e_1_3_2_1_8_1","volume-title":"International Conference on Machine Learning. PMLR, 4901\u20134911","author":"Odena Augustus","year":"2019","unstructured":"Augustus Odena, Catherine Olsson, David Andersen, and Ian Goodfellow. 2019. Tensorfuzz: Debugging neural networks with coverage-guided fuzzing. In International Conference on Machine Learning. PMLR, 4901\u20134911."},{"key":"e_1_3_2_1_9_1","volume-title":"ONNX: Open Neural Network Exchange. https:\/\/onnx.ai\/.","author":"ONNX.","year":"2019","unstructured":"ONNX. 2019. ONNX: Open Neural Network Exchange. https:\/\/onnx.ai\/."},{"key":"e_1_3_2_1_10_1","unstructured":"OpenPilot. 2022. comma.ai driving dataset. http:\/\/github.com\/commaai\/research."},{"volume-title":"SHA256 tag 54d6d9. https:\/\/github.com\/commaai\/openpilot. OpenPilot","year":"2022","key":"e_1_3_2_1_11_1","unstructured":"OpenPilot. 2022. OpenPilot open source driver assistance system, SHA256 tag 54d6d9. https:\/\/github.com\/commaai\/openpilot. OpenPilot (2022)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417063"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00036"},{"key":"e_1_3_2_1_14_1","unstructured":"The Autoware Foundation. 2021. Autoware. https:\/\/www.autoware.org\/."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA51294.2020.00042"},{"key":"e_1_3_2_1_16_1","unstructured":"Waymo. 2021. Waymo Driver. https:\/\/waymo.com\/waymo-driver\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330579"}],"event":{"name":"ASE '22: 37th IEEE\/ACM International Conference on Automated Software Engineering","acronym":"ASE '22","location":"Rochester MI USA"},"container-title":["Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3559500","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551349.3559500","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551349.3559500","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T07:53:03Z","timestamp":1755849183000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3559500"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,10]]},"references-count":17,"alternative-id":["10.1145\/3551349.3559500","10.1145\/3551349"],"URL":"https:\/\/doi.org\/10.1145\/3551349.3559500","relation":{},"subject":[],"published":{"date-parts":[[2022,10,10]]},"assertion":[{"value":"2023-01-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}