Videos of demo of self-driving robot with map verification
dc.contributor.author | Liu, Jed | |
dc.contributor.author | Corbett-Davies, Joseph | |
dc.contributor.author | Ferraiuolo, Andrew | |
dc.contributor.author | Campbell, Mark | |
dc.contributor.author | Myers, Andrew C. | |
dc.contributor.author | Suh, G. Edward | |
dc.date.accessioned | 2017-10-07T05:50:17Z | |
dc.date.available | 2017-10-07T05:50:17Z | |
dc.date.issued | 2017-10-06 | |
dc.description | This project is supported by NASA. | en_US |
dc.description.abstract | Three videos of a self-driving Segway system are shown, following an oval track. Delivering the system an incorrect map causes the system to drive off the track. The third video shows the system running with software that performs map verification and falls back to a safe planner when verification fails. The software is implemented in Jif, which ensures that untrusted maps are not used without verification. | en_US |
dc.description.viewer | 1_xao1j7b5 | en_US |
dc.description.viewer | 1_9q47y6tn | en_US |
dc.description.viewer | 1_gpc09vv4 | en_US |
dc.identifier.uri | https://hdl.handle.net/1813/52638 | |
dc.language.iso | en_US | en_US |
dc.rights | Attribution-NonCommercial 4.0 International | * |
dc.rights.uri | https://creativecommons.org/licenses/by-nc/4.0/ | * |
dc.subject | robot, self-driving vehicle, cyber-physical system, security, information flow | en_US |
dc.title | Videos of demo of self-driving robot with map verification | en_US |
Files
Original bundle
1 - 3 of 3
No Thumbnail Available
- Name:
- NASA-CPS October Demo Scenario 1.mp4
- Size:
- 31.8 MB
- Format:
- Multimedia/Video
- Description:
- Nominal behavior with correct map
No Thumbnail Available
- Name:
- NASA-CPS October Demo Scenario 2.mp4
- Size:
- 30.4 MB
- Format:
- Multimedia/Video
- Description:
- Incorrect behavior of base system when provided with malicious map
No Thumbnail Available
- Name:
- NASA-CPS October Demo Scenario 3.mp4
- Size:
- 19.42 MB
- Format:
- Multimedia/Video
- Description:
- Safe behavior of system using map verification implemented in Jif, when provided with a malicious map.