Projects per year
Abstract
We consider the problem of falsifying safety requirements of Cyber-Physical Systems expressed in signal temporal logic (STL). This problem can be turned into an optimization problem via STL robustness functions. In this paper, our focus is in falsifying systems with multiple requirements. We propose to solve such conjunctive requirements using online generative adversarial networks (GANs) as test generators. Our main contribution is an algorithm which falsifies a conjunctive requirement ϕ1 ∧•⋯•∧ϕn by using a GAN for each requirement ϕi separately. Using ideas from multi-armed bandit algorithms, our algorithm only trains a single GAN at every step, which saves resources. Our experiments indicate that, in addition to saving resources, this multi-armed bandit algorithm can falsify requirements with fewer number of executions on the system under test when compared to (i) an algorithm training a single GAN for the complete conjunctive requirement and (ii) an algorithm always training n GANs at each step.
Original language | English |
---|---|
Title of host publication | 2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW) |
Publisher | IEEE |
Pages | 21-28 |
ISBN (Print) | 978-1-6654-9628-5 |
DOIs | |
Publication status | Published - 2022 |
MoE publication type | A4 Article in a conference publication |
Event | IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW - Duration: 4 Apr 2022 → 13 Apr 2022 |
Publication series
Name | IEEE International Conference on Software Testing, Verification and Validation Workshops |
---|---|
ISSN (Print) | 2159-4848 |
Conference
Conference | IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW |
---|---|
Abbreviated title | ICSTW |
Period | 04/04/22 → 13/04/22 |
Fingerprint
Dive into the research topics of 'Falsification of Multiple Requirements for Cyber-Physical Systems Using Online Generative Adversarial Networks and Multi-Armed Bandits'. Together they form a unique fingerprint.Projects
- 1 Active