Falsification of Multiple Requirements for Cyber-Physical Systems Using Online Generative Adversarial Networks and Multi-Armed Bandits

Jarkko Peltomäki*, Ivan Porres

*Tämän työn vastaava kirjoittaja

Tutkimustuotos: Artikkeli kirjassa/raportissa/konferenssijulkaisussaKonferenssiartikkeliTieteellinenvertaisarvioitu

Abstrakti

We consider the problem of falsifying safety requirements of Cyber-Physical Systems expressed in signal temporal logic (STL). This problem can be turned into an optimization problem via STL robustness functions. In this paper, our focus is in falsifying systems with multiple requirements. We propose to solve such conjunctive requirements using online generative adversarial networks (GANs) as test generators. Our main contribution is an algorithm which falsifies a conjunctive requirement ϕ1 ∧•⋯•∧ϕn by using a GAN for each requirement ϕi separately. Using ideas from multi-armed bandit algorithms, our algorithm only trains a single GAN at every step, which saves resources. Our experiments indicate that, in addition to saving resources, this multi-armed bandit algorithm can falsify requirements with fewer number of executions on the system under test when compared to (i) an algorithm training a single GAN for the complete conjunctive requirement and (ii) an algorithm always training n GANs at each step.

AlkuperäiskieliEnglanti
Otsikko2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)
KustantajaIEEE
Sivut21-28
ISBN (painettu) 978-1-6654-9628-5
DOI - pysyväislinkit
TilaJulkaistu - 2022
OKM-julkaisutyyppiA4 Artikkeli konferenssijulkaisuussa
Tapahtuma IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW -
Kesto: 4 huhtik. 202213 huhtik. 2022

Julkaisusarja

NimiIEEE International Conference on Software Testing, Verification and Validation Workshops
ISSN (painettu)2159-4848

Konferenssi

Konferenssi IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW
LyhennettäICSTW
Ajanjakso04/04/2213/04/22

Sormenjälki

Sukella tutkimusaiheisiin 'Falsification of Multiple Requirements for Cyber-Physical Systems Using Online Generative Adversarial Networks and Multi-Armed Bandits'. Ne muodostavat yhdessä ainutlaatuisen sormenjäljen.

Viittausmuodot