skip to main content
10.1145/2883817.2883819acmconferencesArticle/Chapter ViewAbstractPublication PagescpsweekConference Proceedingsconference-collections
research-article
Public Access

Symbolic-Numeric Reachability Analysis of Closed-Loop Control Software

Published: 11 April 2016 Publication History

Abstract

We study the problem of falsifying reachability properties of real-time control software acting in a closed-loop with a given model of the plant dynamics. Our approach employs numerical techniques to simulate a plant model, which may be highly nonlinear and hybrid, in combination with symbolic simulation of the controller software. The state-space and input-space of the plant are systematically searched using a plant abstraction that is implicitly defined by ``quantization'' of the plant state, but never explicitly constructed. Simultaneously, the controller behaviors are explored using a symbolic execution of the control software. On-the-fly exploration of the overall closed-loop abstraction results in abstract counterexamples, which are used to refine the plant abstraction iteratively until a concrete violation is found. Empirical evaluation of our approach shows its promise in treating controller software that has precise, formal semantics, using an exact method such as symbolic execution, while using numerical simulations to produce abstractions of the underlying plant model that is often an approximation of the actual plant. We also discuss a preliminary comparison of our approach with techniques that are primarily simulation-based.

References

[1]
Y. Annapureddy, C. Liu, G. Fainekos, and S. Sankaranarayanan. S-taliro: A tool for temporal logic falsification for hybrid systems. Proc. TACAS, pages 254--257, 2011.
[2]
A. Bhatia and E. Frazzoli. Incremental search methods for reachability analysis of continuous and hybrid systems. Proc. of HSCC, pages 451--471, 2004.
[3]
C. Cadar, D. Dunbar, and D. R. Engler. Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs. In OSDI, volume 8, pages 209--224, 2008.
[4]
C. Cadar, P. Godefroid, S. Khurshid, C. S. P\uas\uareanu, K. Sen, N. Tillmann, and W. Visser. Symbolic execution for software testing in practice: preliminary assessment. In Proceedings of the 33rd International Conference on Software Engineering, pages 1066--1071. ACM, 2011.
[5]
C. Cadar and K. Sen. Symbolic execution for software testing: three decades later. Communications of the ACM, 56(2):82--90, 2013.
[6]
E. Clarke, A. Fehnker, Z. Han, B. Krogh, J. Ouaknine, O. Stursberg, and M. Theobald. Abstraction and counterexample-guided refinement in model checking of hybrid systems. International Journal of Foundations of Computer Science, 14(04):583--604, 2003.
[7]
P. Cousot and R. Cousot. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Conference Record of the Fourth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 238--252, Los Angeles, California, 1977. ACM Press, New York, NY.
[8]
L. De Moura and N. Bjørner. Z3: An efficient smt solver. In Tools and Algorithms for the Construction and Analysis of Systems, pages 337--340. Springer, 2008.
[9]
J. Deshmukh, X. Jin, J. Kapinski, and O. Maler. Stochastic local search for falsification of hybrid systems. In Automated Technology for Verification and Analysis, pages 500--517. Springer, 2015.
[10]
A. Donzé. Breach, a toolbox for verification and parameter synthesis of hybrid systems. In Proc. CAV, pages 167--170, 2010.
[11]
T. Dreossi, T. Dang, A. Donzé, J. Kapinski, X. Jin, and J. V. Deshmukh. Efficient guiding strategies for testing of temporal properties of hybrid systems. In NASA Formal Methods, pages 127--142. Springer, 2015.
[12]
A. Fehnker and F. Ivan\^cić. Benchmarks for hybrid systems verification. In Proc. of HSCC, volume 2993, pages 326--341, 2004.
[13]
D. Giannakopoulou and K. Havelund. Automata-based verification of temporal properties on running programs. In Automated Software Engineering, 2001.(ASE 2001). Proceedings. 16th Annual International Conference on, pages 412--416. IEEE, 2001.
[14]
K. Havelund and G. Roşu. Monitoring programs using rewriting. In Automated Software Engineering, 2001.(ASE 2001). Proceedings. 16th Annual International Conference on, pages 135--143. IEEE, 2001.
[15]
K. Havelund and G. Roşu. Synthesizing monitors for safety properties. In Tools and Algorithms for the Construction and Analysis of Systems, pages 342--356. Springer, 2002.
[16]
X. Jin, J. V. Deshmukh, J. Kapinski, K. Ueda, and K. Butts. Powertrain control verification benchmark. In Proceedings of the 17th international conference on Hybrid systems: computation and control, pages 253--262. ACM, 2014.
[17]
J. Kim, J. M. Esposito, and V. Kumar. An RRT-based algorithm for testing and validating multi-robot controllers. Technical report, DTIC Document, 2005.
[18]
J. C. King. Symbolic execution and program testing. Communications of the ACM, 19(7):385--394, 1976.
[19]
S. M. LaValle. Rapidly-exploring random trees a new tool for path planning. Technical Report TR 98--11, Computer Science Dept., Iowa State University, Ames, Iowa, 1998.
[20]
F. Lerda, J. Kapinski, E. Clarke, and B. Krogh. Verification of supervisory control software using state proximity and merging. Hybrid Systems: Computation and Control, pages 344--357, 2008.
[21]
F. Lerda, J. Kapinski, H. Maka, E. M. Clarke, and B. H. Krogh. Model checking in-the-loop: Finding counterexamples by systematic simulation. In American Control Conference, 2008, pages 2734--2740. IEEE, 2008.
[22]
R. Majumdar, I. Saha, K. Shashidhar, and Z. Wang. Clse: Closed-loop symbolic execution. In NASA Formal Methods, pages 356--370. Springer, 2012.
[23]
T. Nahhal and T. Dang. Test coverage for continuous and hybrid systems. In Computer Aided Verification, pages 449--462, 2007.
[24]
T. Nghiem, S. Sankaranarayanan, G. Fainekos, F. Ivancić, A. Gupta, and G. J. Pappas. Monte-carlo techniques for falsification of temporal properties of non-linear hybrid systems. In Proceedings of the 13th ACM international conference on Hybrid systems: computation and control, pages 211--220. ACM, 2010.
[25]
K. M. Passino, S. Yurkovich, and M. Reinfrank. Fuzzy control, volume 42. Citeseer, 1998.
[26]
J. Robinson. The collected works of Julia Robinson, volume 6. American Mathematical Soc., 1996.
[27]
J. Schimpf and K. Shen. Ecl i ps e--from lp to clp. Theory and Practice of Logic Programming, 12(1--2):127--156, 2012.
[28]
K. Sen, D. Marinov, and G. Agha. CUTE: a concolic unit testing engine for C, volume 30. ACM, 2005.
[29]
N. Williams, B. Marre, P. Mouy, and M. Roger. Pathcrawler: Automatic generation of path tests by combining static and dynamic analysis. In Dependable Computing-EDCC 5, pages 281--292. Springer, 2005.
[30]
A. Zutshi, S. Sankaranarayanan, J. V. Deshmukh, and J. Kapinski. Multiple shooting, cegar-based falsification for hybrid systems. In Proceedings of the 14th International Conference on Embedded Software, page 5. ACM, 2014.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
HSCC '16: Proceedings of the 19th International Conference on Hybrid Systems: Computation and Control
April 2016
324 pages
ISBN:9781450339551
DOI:10.1145/2883817
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 April 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. falsification
  2. hybrid systems
  3. program analyses
  4. reachability

Qualifiers

  • Research-article

Funding Sources

Conference

HSCC'16
Sponsor:

Acceptance Rates

HSCC '16 Paper Acceptance Rate 28 of 65 submissions, 43%;
Overall Acceptance Rate 153 of 373 submissions, 41%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)90
  • Downloads (Last 6 weeks)13
Reflects downloads up to 27 Dec 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media