Proceedings of the 8th International Conference on Cyber-Physical Systems 2017
DOI: 10.1145/3055004.3055029
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing neighborhoods of falsifying traces in cyber-physical systems

Abstract: We study the problem of analyzing falsifying traces of cyber-physical systems. Speci cally, given a system model and an input which is a counterexample to a property of interest, we wish to understand which parts of the inputs are "responsible" for the counterexample as a whole. Whereas this problem is well known to be hard to solve precisely, we provide an approach based on learning from repeated simulations of the system under test.Our approach generalizes the classic concept of "one-at-a-time" sensitivity a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(13 citation statements)
references
References 42 publications
0
13
0
Order By: Relevance
“…One thing we can do here is to polish up the method so that it will find solutions more often; the other thing is statistical inference that tells, based on the observed absence of solutions, the confidence with which we can conclude that no solutions exist. See [23] for an example of works in this direction. We shall combine results and observations in statistical model checking (Sect.…”
Section: Numeric and Statistical Methodsmentioning
confidence: 99%
“…One thing we can do here is to polish up the method so that it will find solutions more often; the other thing is statistical inference that tells, based on the observed absence of solutions, the confidence with which we can conclude that no solutions exist. See [23] for an example of works in this direction. We shall combine results and observations in statistical model checking (Sect.…”
Section: Numeric and Statistical Methodsmentioning
confidence: 99%
“…Many of the existing safety validation tools are products of academic research and released as experimental prototypes. Although these tools are prototypes, several have matured enough to gain wide-spread usage and acceptance (Diwakaran et al, 2017;Dreossi et al, 2015;Tuncali et al, 2018;Zhang et al, 2019;Zutshi et al, 2014). Two particular falsification tools have become benchmark standards in the field: S-TaLiRo (G. Fainekos et al, 2019) and Breach (Donzé, 2010).…”
Section: Academic Toolsmentioning
confidence: 99%
“…Finally, we mention the recent work of analyzing neighborhoods of falsifying traces in CPS [11] where the authors use search-based testing to characterize how "robust" is the falsifying trace. This provides an alternative and complementary way of understanding properties of the violation.…”
Section: Related Workmentioning
confidence: 99%