Filters








412 Hits in 5.2 sec

Stochastic Local Search for Falsification of Hybrid Systems [chapter]

Jyotirmoy Deshmukh, Xiaoqing Jin, James Kapinski, Oded Maler
2015 Lecture Notes in Computer Science  
In this paper, we present a falsification technique that uses a local search technique called Tabu search to search for optimal inputs.  ...  A recent advance in falsification is to encode property satisfaction as a cost function based on a finite parameterization of the (bounded-time) input signal, which allows formulating bug-finding as an  ...  For each model, we give requirements in temporal logic and compare the performance of SITAR and S-TaLiRo.  ... 
doi:10.1007/978-3-319-24953-7_35 fatcat:j4qo2jbijjfkdgnwlln6bxv5me

Gray-box Adversarial Testing for Control Systems with Machine Learning Component [article]

Shakiba Yaghoubi, Georgios Fainekos
2018 arXiv   pre-print
In this paper, we provide a gradient based method for searching the input space of a closed-loop control system in order to find adversarial samples against some system-level requirements.  ...  Neural Networks (NN) have been proposed in the past as an effective means for both modeling and control of systems with very complex dynamics.  ...  ACKNOWLEDGEMENT This work was partially supported by the NSF awards CNS 1350420, IIP-1361926, and the NSF I/UCRC Center for Embedded Systems.  ... 
arXiv:1812.11958v1 fatcat:euzn6fwhergrtjosa7txpyecau

Functional gradient descent method for Metric Temporal Logic specifications

Houssam Abbas, Andrew Winn, Georgios Fainekos, A. Agung Julius
2014 2014 American Control Conference  
Metric Temporal Logic (MTL) specifications can capture complex state and timing requirements.  ...  The search for such a trajectory is conducted over the space of initial conditions, system parameters and input signals.  ...  S-TALIRO [4] and BREACH [5] can be used for both falsification and open loop control design for temporal logic specifications.  ... 
doi:10.1109/acc.2014.6859453 dblp:conf/amcc/AbbasWFJ14 fatcat:cifsy4s7pfferphdxvxwsxcx3e

Local Descent For Temporal Logic Falsification of Cyber-Physical Systems (Extended Technical Report) [article]

Shakiba Yaghoubi, Georgios Fainekos
2018 arXiv   pre-print
In this paper, functional gradient descent for hybrid systems is utilized for locally decreasing the robustness metric.  ...  Since reachability analysis for hybrid nonlinear automata is a very challenging and computationally expensive problem, in practice, engineers try to solve the requirements falsification problem.  ...  Acknowledgments This work was partially supported by the NSF awards CNS-1319560, CNS 1350420, IIP-1361926, and the NSF I/UCRC Center for Embedded Systems.  ... 
arXiv:1802.04866v1 fatcat:3qyensvshrckvebw2iw4hmceba

A Survey of Algorithms for Black-Box Safety Validation [article]

Anthony Corso, Robert J. Moss, Mark Koren, Ritchie Lee, Mykel J. Kochenderfer
2020 arXiv   pre-print
We present and discuss algorithms in the domains of optimization, path planning, reinforcement learning, and importance sampling.  ...  Problem decomposition techniques are presented to help scale algorithms to large state spaces, and a brief overview of safety-critical applications is given, including autonomous vehicles and aircraft  ...  A common component specific to academic falsification-only tools is the use of temporal logic to specify system requirements-encoded in signal temporal logic (STL) or metric temporal logic (MTL).  ... 
arXiv:2005.02979v2 fatcat:f3xch54ncncb5osveeaw3q4zva

BreachFlows: Simulation-Based Design with Formal Requirements for Industrial CPS (Extended Abstract)

Alexandre Donzé, Jyotirmoy V. Deshmukh, Sebastian Steinhorst
2020 Design, Automation, and Test in Europe  
Falsification is a type of approach that goes beyond testing in the direction of a more formal methodology. It has emerged in the recent years with some success.  ...  Based on experience acquired during close collaborations between academia and industry, Decyphir is developing BreachFlows, and extension/front-end for Breach which implements features that are required  ...  Solver go from "barbaric" random searches to genetic algorithm, local search with gradient estimation, etc. A.  ... 
doi:10.4230/oasics.asd.2020.5 dblp:conf/date/Donze20 fatcat:5m65e3zikvd4lji2tekbhe5ys4

Classification and Coverage-Based Falsification for Embedded Control Systems [chapter]

Arvind Adimoolam, Thao Dang, Alexandre Donzé, James Kapinski, Xiaoqing Jin
2017 Lecture Notes in Computer Science  
This falsification algorithm combines global and local search methods and uses a classification technique based on support vector machines to identify regions of the search space on which to focus effort  ...  A practical approach for testing and debugging these system designs is falsification, wherein the user provides a temporal logic specification of correct system behaviors, and some technique for selecting  ...  Signal Temporal Logic. To specify correct behavior of a system defined by (1), we use signal temporal logic (STL) [23] . STL can capture behaviors of real valued signals over discrete or dense time.  ... 
doi:10.1007/978-3-319-63387-9_24 fatcat:oudb7ggvtzd6zlg7cmojlxqdsq

NeuralExplorer: State Space Exploration of Closed Loop Control Systems Using Neural Networks [article]

Manish Goyal, Parasara Sridhar Duggirala
2020 arXiv   pre-print
In this paper, we propose a framework for performing state space exploration of closed loop control systems.  ...  We show how the approximation of sensitivity and inverse sensitivity can be used for computing estimates of the reachable set.  ...  Finally, using falsification tools would require the specification to be given in a temporal logic such as signal temporal logic or metric temporal logic.  ... 
arXiv:2007.05685v1 fatcat:3g4a37tbsjeyhiblhrcxqwunpa

Linear Hybrid System Falsification through Local Search [chapter]

Houssam Abbas, Georgios Fainekos
2011 Lecture Notes in Computer Science  
In this paper, we address the problem of local search for the falsification of hybrid automata with affine dynamics.  ...  The purpose of developing such a local search method is to combine it with high level stochastic optimization algorithms in order to falsify hybrid systems with complex discrete dynamics and high dimensional  ...  These results will enable local descent search for the satisfaction of arbitrary linear temporal logic specifications, not only safety specifications.  ... 
doi:10.1007/978-3-642-24372-1_39 fatcat:my5dwckojndbhgurd5lht477am

Automatic Testing With Reusable Adversarial Agents [article]

Xin Qin, Nikos Aréchiga, Andrew Best, Jyotirmoy Deshmukh
2021 arXiv   pre-print
Specifically, we explore the use of tabular and deep reinforcement learning approaches for synthesizing adversarial agents.  ...  Given a logical specification of the correct behavior of the ego agent, and a set of constraints that encode reasonable adversarial behavior, our framework reduces the adversarial testing problem to the  ...  Most falsification techniques use fixed finitary parameterization of system input signals to define a finite-dimensional search space, and use global optimizers to search for parameter values that lead  ... 
arXiv:1910.13645v3 fatcat:wa564vv6n5fgpnptvpxveuepny

Active Requirement Mining of Bounded-Time Temporal Properties of Cyber-Physical Systems [article]

Gang Chen and Zachary Sabato and Zhaodan Kong
2016 arXiv   pre-print
This paper uses active learning to solve the problem of mining bounded-time signal temporal requirements of cyber-physical systems or simply the requirement mining problem.  ...  By utilizing robustness degree, we formulates the requirement mining problem into two optimization problems, a parameter synthesis problem and a falsification problem.  ...  Introduction In this paper, we propose the use of active learning for mining bounded-time signal temporal logic (STL) requirements of cyber-physical systems (CPSs).  ... 
arXiv:1603.00814v1 fatcat:hr6eeiqhjfdrxa3ksqs3wnboxy

Hybrid System Falsification under (In)equality Constraints via Search Space Transformation

Zhenya Zhang, Paolo Arcaini, Ichiro Hasuo
2020 IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  
Index Terms-(In)equality constraints, hybrid system falsification, search space transformation, signal temporal logic.  ...  In this article, we solve this problem using a search space transformation that first maps points of the unconstrained search space to points of the constrained one, and then defines the fitness of the  ...  Let us call x 1 and x 2 the two dimensions of the search space.  ... 
doi:10.1109/tcad.2020.3013073 fatcat:fckkmg3ybzhnbbf3qqzsz5rrge

Efficient falsification approach for autonomous vehicle validation using a parameter optimisation technique based on reinforcement learning [article]

Dhanoop Karunakaran, Stewart Worrall, Eduardo Nebot
2020 arXiv   pre-print
We demonstrate that by using the proposed method, we can more efficiently search for challenging scenarios which could cause the system to fail in order to satisfy the safety requirements.  ...  The uncertainties in the behaviour of the traffic participants and the dynamic world cause stochastic reactions in advanced autonomous systems.  ...  ACKNOWLEDGMENT This work has been funded by the Australian Centre for Field Robotics (ACFR), University of Sydney and Insurance Australia Group (IAG) and iMOVE CRC and supported by the Cooperative Research  ... 
arXiv:2011.07699v1 fatcat:n6ybc3s4vfgejhi2r2btkiy45i

Monte-carlo techniques for falsification of temporal properties of non-linear hybrid systems

Truong Nghiem, Sriram Sankaranarayanan, Georgios Fainekos, Franjo Ivancić, Aarti Gupta, George J. Pappas
2010 Proceedings of the 13th ACM international conference on Hybrid systems: computation and control - HSCC '10  
Global optimization is carried out using a Monte-Carlo technique that performs a random walk over the space of inputs consisting of initial states, controls and disturbances.  ...  The robustness metric defines the satisfaction of an MTL property over a given trajectory as a real number, as opposed to the Boolean 0 − 1 notion used in Logic.  ...  We then present metrics and use them to provide continuous semantics for Metric Temporal Logic (MTL) over continuous time trajectories. This is based on our previous work [12] .  ... 
doi:10.1145/1755952.1755983 dblp:conf/hybrid/NghiemSFIGP10 fatcat:hs7tb2havrbhji5jjo4xtaww2u

Probabilistic Temporal Logic Falsification of Cyber-Physical Systems

Houssam Abbas, Georgios Fainekos, Sriram Sankaranarayanan, Franjo Ivančić, Aarti Gupta
2013 ACM Transactions on Embedded Computing Systems  
We present a Monte-Carlo optimization technique for finding system behaviors that falsify a Metric Temporal Logic (MTL) property.  ...  Our approach performs a random walk over the space of system inputs guided by a robustness metric defined by the MTL property.  ...  ACKNOWLEDGMENTS The authors would like to thank Truong Nghiem and Professor George Pappas for the useful discussions and the reviewers for the very careful reading of the manuscript and their numerous  ... 
doi:10.1145/2465787.2465797 fatcat:q4aeya45urhlbhkpmccn6gnm3e
« Previous Showing results 1 — 15 out of 412 results