2017
DOI: 10.4204/eptcs.257.2
|View full text |Cite
|
Sign up to set email alerts
|

Causality-Aided Falsification

Abstract: Falsification is drawing attention in quality assurance of heterogeneous systems whose complexities are beyond most verification techniques' scalability. In this paper we introduce the idea of causality aid in falsification: by providing a falsification solver-that relies on stochastic optimization of a certain cost function-with suitable causal information expressed by a Bayesian network, search for a falsifying input value can be efficient. Our experiment results show the idea's viability.

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2

Relationship

3
2

Authors

Journals

citations
Cited by 8 publications
(14 citation statements)
references
References 20 publications
0
14
0
Order By: Relevance
“…So far, the falsification problem has received extensive industrial and academic attention. One possible approach direction by hill-climbing optimization is an established field, too: see [2][3][4]10,[13][14][15]17,26,29,[36][37][38][39]42] and the tools Breach [13] and S-TaLiRo [4]. We formulate the problem and the methodology, for later use in describing our falsification approach.…”
Section: Hill Climbing-guided Falsificationmentioning
confidence: 99%
See 2 more Smart Citations
“…So far, the falsification problem has received extensive industrial and academic attention. One possible approach direction by hill-climbing optimization is an established field, too: see [2][3][4]10,[13][14][15]17,26,29,[36][37][38][39]42] and the tools Breach [13] and S-TaLiRo [4]. We formulate the problem and the methodology, for later use in describing our falsification approach.…”
Section: Hill Climbing-guided Falsificationmentioning
confidence: 99%
“…Since CMA-ES has proved to be the state-of-the-art stochastic algorithm [39], we select CMA-ES as our backend optimizer for the playout phase. 3 We apply the two approaches, ForeSee and Breach, to each benchmark specification reported in Table 1. Since both approaches are based on stochastic optimization, we repeat each experiment for 30 times, as suggested by a guideline for conducting experiments with randomized algorithms [5].…”
Section: Experiments Setupmentioning
confidence: 99%
See 1 more Smart Citation
“…For the remainder of this subsection, we will elaborate on the hyper-parametersσ x (line 9 in Algorithm 2 and Equation (8) in Problem 2) andσ θ (line 19 in Algorithm 2 and Equation (10) in Problem 3). Interest in leveraging GPs for the purpose of formal verification, mining, and inference of CPSs has surged as of late [8,13,17,18,28]. Among the current works, many assume that the true hyper-parameters are known a priori and also fixed.…”
Section: Single Satisfactory Valuationmentioning
confidence: 99%
“…We have implemented our MAB-based falsification framework in MATLAB, building on Breach [11]. 3 Our experiments with benchmarks from [7,24,25] demonstrate that our MAB-based approach is a viable one against the scale problem. In particular, our approach is observed to be (almost totally) robust under the change of scaling (i.e.…”
Section: Introductionmentioning
confidence: 99%