Causality-Aided Falsification

Falsification is drawing attention in quality assurance of heterogeneous systems whose complexities are beyond most verification techniques' scalability. In this paper we introduce the idea of causality aid in falsification: by providing a falsification solver -- that relies on stochastic optimization of a certain cost function -- with suitable causal information expressed by a Bayesian network, search for a falsifying input value can be efficient. Our experiment results show the idea's viability.

[1]  Oded Maler,et al.  Robust Satisfaction of Temporal Logic over Real-Valued Signals , 2010, FORMATS.

[2]  Houssam Abbas,et al.  Benchmarks for Temporal Logic Requirements for Automotive Systems , 2014, ARCH@CPSWeek.

[3]  Sriram Sankaranarayanan,et al.  Falsification of temporal properties of hybrid systems using the cross-entropy method , 2012, HSCC '12.

[4]  Houssam Abbas,et al.  Using S-TaLiRo on Industrial Size AuImmlertomotive Models , 2015, ARCH@CPSWeek.

[5]  Ichiro Hasuo,et al.  Input Synthesis for Sampled Data Systems by Program Logic , 2014, HAS.

[6]  Andreas Krause,et al.  Information-Theoretic Regret Bounds for Gaussian Process Optimization in the Bandit Setting , 2009, IEEE Transactions on Information Theory.

[7]  Sriram Sankaranarayanan,et al.  S-TaLiRo: A Tool for Temporal Logic Falsification for Hybrid Systems , 2011, TACAS.

[8]  Takumi Akazaki Falsification of Conditional Safety Properties for Cyber-Physical Systems with Gaussian Process Regression , 2016, RV.

[9]  Claire Jones,et al.  Probabilistic non-determinism , 1990 .

[10]  Thomas A. Henzinger,et al.  The benefits of relaxing punctuality , 1991, JACM.

[11]  Gang Chen,et al.  Active Requirement Mining of Bounded-Time Temporal Properties of Cyber-Physical Systems , 2016, ArXiv.

[12]  Alexandre Donzé,et al.  Breach, A Toolbox for Verification and Parameter Synthesis of Hybrid Systems , 2010, CAV.

[13]  Christopher K. I. Williams,et al.  Gaussian Processes for Machine Learning (Adaptive Computation and Machine Learning) , 2005 .

[14]  George J. Pappas,et al.  Robustness of temporal logic specifications for continuous-time signals , 2009, Theor. Comput. Sci..

[15]  Gang Chen,et al.  Active learning based requirement mining for cyber-physical systems , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[16]  Dexter Kozen,et al.  Semantics of probabilistic programs , 1979, 20th Annual Symposium on Foundations of Computer Science (sfcs 1979).

[17]  Sriram Sankaranarayanan,et al.  A trajectory splicing approach to concretizing counterexamples for hybrid systems , 2013, 52nd IEEE Conference on Decision and Control.

[18]  Annabelle McIver,et al.  Probabilistic predicate transformers , 1996, TOPL.

[19]  Ichiro Hasuo,et al.  Time Robustness in MTL and Expressivity in Hybrid System Falsification , 2015, CAV.

[20]  J. Mockus Bayesian Approach to Global Optimization: Theory and Applications , 1989 .

[21]  Dejan Nickovic,et al.  Monitoring Temporal Properties of Continuous Signals , 2004, FORMATS/FTRTFT.

[22]  Sriram Sankaranarayanan,et al.  Multiple shooting, CEGAR-based falsification for hybrid systems , 2014, EMSOFT '14.

[23]  James Kapinski,et al.  Stochastic Local Search for Falsification of Hybrid Systems , 2015, ATVA.

[24]  Joost-Pieter Katoen,et al.  Reasoning about Recursive Probabilistic Programs* , 2016, 2016 31st Annual ACM/IEEE Symposium on Logic in Computer Science (LICS).

[25]  Sriram Sankaranarayanan,et al.  Requirements driven falsification with coverage metrics , 2015, 2015 International Conference on Embedded Software (EMSOFT).