Falsification of Multiple Requirements for Cyber-Physical Systems Using Online Generative Adversarial Networks and Multi-Armed Bandits

Jarkko Peltomäki*, Ivan Porres

*Corresponding author for this work

Research output: Chapter in Book/Conference proceedingConference contributionScientificpeer-review

1 Citation (Scopus)

Abstract

We consider the problem of falsifying safety requirements of Cyber-Physical Systems expressed in signal temporal logic (STL). This problem can be turned into an optimization problem via STL robustness functions. In this paper, our focus is in falsifying systems with multiple requirements. We propose to solve such conjunctive requirements using online generative adversarial networks (GANs) as test generators. Our main contribution is an algorithm which falsifies a conjunctive requirement ϕ1 ∧•⋯•∧ϕn by using a GAN for each requirement ϕi separately. Using ideas from multi-armed bandit algorithms, our algorithm only trains a single GAN at every step, which saves resources. Our experiments indicate that, in addition to saving resources, this multi-armed bandit algorithm can falsify requirements with fewer number of executions on the system under test when compared to (i) an algorithm training a single GAN for the complete conjunctive requirement and (ii) an algorithm always training n GANs at each step.

Original languageEnglish
Title of host publication2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)
PublisherIEEE
Pages21-28
ISBN (Print) 978-1-6654-9628-5
DOIs
Publication statusPublished - 2022
MoE publication typeA4 Article in a conference publication
Event IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW -
Duration: 4 Apr 202213 Apr 2022

Publication series

NameIEEE International Conference on Software Testing, Verification and Validation Workshops
ISSN (Print)2159-4848

Conference

Conference IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW
Abbreviated titleICSTW
Period04/04/2213/04/22

Fingerprint

Dive into the research topics of 'Falsification of Multiple Requirements for Cyber-Physical Systems Using Online Generative Adversarial Networks and Multi-Armed Bandits'. Together they form a unique fingerprint.

Cite this