Efficient Optimization-Based Falsification of Cyber-Physical Systems with Multiple Conjunctive Requirements

被引:6
|
作者
Mathesen, Logan [1 ]
Pedrielli, Giulia [1 ]
Fainekos, Georgios [1 ]
机构
[1] Arizona State Univ, Decis Syst Engn CIDSE, 699 S Mill Ave, Tempe, AZ 85281 USA
关键词
D O I
10.1109/CASE49439.2021.9551474
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Optimization-based falsification, or search-based testing, is a method of automatic test generation for Cyber-Physical System (CPS) safety evaluation. CPS safety evaluation is guided by high level system requirements that are expressed in Signal Temporal Logic (STL). Trajectories from executed CPS simulations are evaluated against STL requirements using satisfaction robustness as a quantitative metric. In particular, robustness is the distance metric between the simulated system trajectory, associated to a specific input, and the known unsafe set, i.e., regions of the search space that violate the requirements. Identification of violations can be formulated as an optimization problem, where inputs that minimize the robustness function are of interest. In fact, an input falsifies a requirement if the associated robustness is negative. In this work, specifically, we consider the case where multiple requirements determine the unsafe set. Due to the computational burden of executing CPS simulations, practitioners often test all system requirements simultaneously by combining the requirement components and obtaining so-called "conjunctive requirements". Conjunctive requirements can challenge optimization-based falsification approaches due to the fact that the robustness function may "mask" the contributions of individual conjunctive requirement components. We propose a new algorithm, minimum Bayesian optimization (minBO), that deals with this problem by considering the contributions of each component of the conjunctive requirement. We show the advantages of the minBO optimization algorithm when applied to general non-linear non-convex optimization problems as well as when applied to realistic falsification applications.
引用
收藏
页码:732 / 737
页数:6
相关论文
共 50 条
  • [21] Modeling and Requirements on the Physical Side of Cyber-Physical Systems
    Heimdahl, Mats P. E.
    Duan, Lian
    Murugesan, Anitha
    Rayadurgam, Sanjai
    [J]. 2013 2ND INTERNATIONAL WORKSHOP ON THE TWIN PEAKS OF REQUIREMENTS AND ARCHITECTURE (TWINPEAKS), 2013, : 1 - 7
  • [22] Trustworthiness requirements for manufacturing cyber-physical systems
    Babiceanu, Radu F.
    Seker, Remzi
    [J]. 27TH INTERNATIONAL CONFERENCE ON FLEXIBLE AUTOMATION AND INTELLIGENT MANUFACTURING, FAIM2017, 2017, 11 : 973 - 981
  • [23] Modeling and Specifying Requirements for Cyber-Physical Systems
    Ordinez, L.
    Alimenti, O.
    Rinland, E.
    Gomez, M.
    Marchetti, J.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2013, 11 (01) : 625 - 632
  • [24] Requirements Engineering Patterns for Cyber-Physical Systems
    Ponsard, Christophe
    Deprez, Jean-Christophe
    Darimont, Robert
    [J]. ERCIM NEWS, 2014, (97): : 34 - 35
  • [25] Efficient Computing in Cyber-Physical Systems
    Marwedel, Peter
    Engel, Michael
    [J]. 2012 INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTER SYSTEMS (SAMOS): ARCHITECTURES, MODELING AND SIMULATION, 2012, : 328 - 332
  • [26] Genetic optimization-based scheduling in maritime cyber physical systems
    Yang, Tingting
    Feng, Hailong
    Zhao, Jian
    Deng, Ruilong
    Wang, Ying
    Su, Zhou
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (07):
  • [27] Security Requirements Engineering: A Framework for Cyber-Physical Systems
    Rehman, Shafiq Ur
    Allgaier, Christopher
    Gruhn, Volker
    [J]. 2018 INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY (FIT 2018), 2018, : 315 - 320
  • [28] Hybrid deep architecture for intrusion detection in cyber-physical system: An optimization-based approach
    Arumugam, Sajeev Ram
    Paul, P. Mano
    Issac, Berin Jeba Jingle
    Ananth, J. P.
    [J]. INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING, 2024, 38 (09) : 3016 - 3039
  • [29] Testing Cyber-Physical Systems Using a Line-Search Falsification Method
    Ramezani, Zahra
    Claessen, Koen
    Smallbone, Nicholas
    Fabian, Martin
    Akesson, Knut
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (08) : 2393 - 2406
  • [30] A Scalable Compositional Falsification Approach for Identifying Challenging Scenarios in Cyber-Physical Systems
    Muniraj, Devaprakash
    Farhood, Mazen
    [J]. IEEE SYSTEMS JOURNAL, 2023, 17 (03): : 4821 - 4832