A self-learning approach for validation of communication in embedded systems

This paper demonstrates a new approach that addresses the problem of evaluating the communication behavior of embedded systems by applying algorithms from the area of artificial intelligence. An important problem for the validation for the interaction in the distributed system is missing, wrong or incomplete specification. This paper demonstrates the application of a new self-learning approach for assessing the communication behavior based on reference traces. The benefit of the approach is that it works automatically, with low additional effort and without using any specification. The investigated methodology uses algorithms from the field of machine learning and data mining to extract behavior models out of a reference trace. For showing the application, this paper provides a use case and the basic setup for the proposed method. The applicability of this self-learning methodology is evaluated based on real vehicle network data.

[1]  Ilja Radusch,et al.  Logging Design for Vehicle Communication Field Operational Tests , 2011 .

[2]  Yi Li,et al.  COOLCAT: an entropy-based algorithm for categorical clustering , 2002, CIKM '02.

[3]  Bengt Jonsson,et al.  Learning of event-recording automata , 2010, Theor. Comput. Sci..

[4]  Roman Obermaisser,et al.  Out-of-norm assertions [diagnostic mechanism] , 2005, 11th IEEE Real Time and Embedded Technology and Applications Symposium.

[5]  Marc Zeller,et al.  Approach for Iterative Validation of Automotive Embedded Systems , 2010 .

[6]  Junfeng Yang,et al.  Correlation exploitation in error ranking , 2004, SIGSOFT '04/FSE-12.

[7]  Benedikt Bollig,et al.  Replaying Play In and Play Out: Synthesis of Design Models from Scenarios by Learning , 2007, TACAS.

[8]  Dana Angluin,et al.  Learning Regular Sets from Queries and Counterexamples , 1987, Inf. Comput..

[9]  Marc Zeller,et al.  Interface Verification Using Executable Reference Models: An Application in the Automotive Infotainment , 2013, ACESMB@MoDELS.

[10]  Tao Li,et al.  Entropy-based criterion in categorical clustering , 2004, ICML.

[11]  Robyn R. Lutz,et al.  Requirements discovery during the testing of safety-critical software , 2003, 25th International Conference on Software Engineering, 2003. Proceedings..

[12]  Marc Zeller,et al.  Towards Efficient On-line Schedulability Tests for Adaptive Networked Embedded Real-time Systems , 2012, PECCS.

[13]  Somesh Jha,et al.  Markov chains, classifiers, and intrusion detection , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..

[14]  Robyn R. Lutz,et al.  Analyzing software requirements errors in safety-critical, embedded systems , 1993, [1993] Proceedings of the IEEE International Symposium on Requirements Engineering.

[15]  Gojko Adzic Specification by Example: How Successful Teams Deliver the Right Software , 2011 .

[16]  Capers Jones,et al.  Embedded Software: Facts, Figures, and Future , 2009, Computer.

[17]  Falk Langer,et al.  Fault Detection in Discrete Event Based Distributed Systems by Forecasting Message Sequences with Neural Networks , 2009, KI.

[18]  Falk Langer,et al.  Using Reference Traces for Validation of Communication in Embedded Systems , 2014, ICONS 2014.

[19]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[20]  Bengt Jonsson,et al.  Insights to Angluin's Learning , 2005, SVV@ICLP.