2020
DOI: 10.1109/tcad.2020.3013073
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid System Falsification Under (In)equality Constraints via Search Space Transformation

Abstract: Verification of hybrid systems is intrinsically hard, due to the continuous dynamics that leads to infinite search spaces. Therefore, research attempts focused on hybrid system falsification of a black-box model, a technique that aims at finding an input signal violating the desired temporal specification. Main falsification approaches are based on stochastic hill-climbing optimization, that tries to minimize the degree of satisfaction of the temporal specification, given by its robust semantics. However, in t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 29 publications
0
4
0
Order By: Relevance
“…So far, the falsification problem has received extensive industrial and academic attention. One possible approach direction by hill-climbing optimization is an established field, too: see [2][3][4]10,[13][14][15]17,26,29,[36][37][38][39]42] and the tools Breach [13] and S-TaLiRo [4]. We formulate the problem and the methodology, for later use in describing our falsification approach.…”
Section: Hill Climbing-guided Falsificationmentioning
confidence: 99%
“…So far, the falsification problem has received extensive industrial and academic attention. One possible approach direction by hill-climbing optimization is an established field, too: see [2][3][4]10,[13][14][15]17,26,29,[36][37][38][39]42] and the tools Breach [13] and S-TaLiRo [4]. We formulate the problem and the methodology, for later use in describing our falsification approach.…”
Section: Hill Climbing-guided Falsificationmentioning
confidence: 99%
“…Software tools, including S-TaLiRo, Breach, C2E2, and DryVR, have become instrumental in the field of system falsification, representing crucial advancements in simulation-driven testing (Fainekos et al 2012;Annpureddy et al 2011;Donzé 2010;Duggirala et al 2015;Qi et al 2018). These tools are part of a broader evolution that encompasses techniques ranging from searchbased algorithms to machine learning and data-driven approaches, all aimed at enhancing the effectiveness of falsification methods (Ramezani et al 2021;Zhang et al 2021;Zhang, Arcaini, and Hasuo 2020;Deshmukh et al 2015;Ernst et al 2021;Mathesen, Pedrielli, and Fainekos 2021;Akazaki et al 2018;Qin et al 2019;Zhang, Hasuo, and Arcaini 2019). Despite these advancements, the challenges of simulation-driven falsification remain multifaceted.…”
Section: Introductionmentioning
confidence: 99%
“…The primary goal of falsification is to pinpoint scenarios that could lead to system failure or breaches in safety specifications. Various techniques have been proposed to tackle the falsification problem, including optimization-based methods [11,19,6], search-based algorithms [12,15,20], and reinforcement learning approaches [18,16,10]. These methods strive to efficiently explore the state and parameter space in order to discover potential failure scenarios, ultimately enabling system design refinement and enhanced safety assurances.…”
Section: Introductionmentioning
confidence: 99%