57 research outputs found

    Reach Set Approximation through Decomposition with Low-dimensional Sets and High-dimensional Matrices

    Full text link
    Approximating the set of reachable states of a dynamical system is an algorithmic yet mathematically rigorous way to reason about its safety. Although progress has been made in the development of efficient algorithms for affine dynamical systems, available algorithms still lack scalability to ensure their wide adoption in the industrial setting. While modern linear algebra packages are efficient for matrices with tens of thousands of dimensions, set-based image computations are limited to a few hundred. We propose to decompose reach set computations such that set operations are performed in low dimensions, while matrix operations like exponentiation are carried out in the full dimension. Our method is applicable both in dense- and discrete-time settings. For a set of standard benchmarks, it shows a speed-up of up to two orders of magnitude compared to the respective state-of-the art tools, with only modest losses in accuracy. For the dense-time case, we show an experiment with more than 10.000 variables, roughly two orders of magnitude higher than possible with previous approaches

    Computer Aided Verification

    Get PDF
    This open access two-volume set LNCS 13371 and 13372 constitutes the refereed proceedings of the 34rd International Conference on Computer Aided Verification, CAV 2022, which was held in Haifa, Israel, in August 2022. The 40 full papers presented together with 9 tool papers and 2 case studies were carefully reviewed and selected from 209 submissions. The papers were organized in the following topical sections: Part I: Invited papers; formal methods for probabilistic programs; formal methods for neural networks; software Verification and model checking; hyperproperties and security; formal methods for hardware, cyber-physical, and hybrid systems. Part II: Probabilistic techniques; automata and logic; deductive verification and decision procedures; machine learning; synthesis and concurrency. This is an open access book

    Hybrid Reachability Analysis for Kuramoto-Lanchester Model

    Get PDF
    Cyber-physical systems are ubiquitous nowadays and play a significant role in people's daily life. These systems include, e.g., autonomous vehicles and aerospace systems. Since human lives rely on the performance of these systems, it is of utmost importance to ensure their reliability. However, their complexity makes analysis particularly challenging and computationally expensive. Thus, it is crucial to develop tools to efficiently analyze cyber-physical systems and their safety properties. Cyber-physical systems are often modeled by hybrid automata, i.e. finite-state machines augmented with ordinary differential equations. In the thesis, we investigate reachability analysis methods for hybrid automata. In particular, we extend JuliaReach, a framework for fast prototyping set-based reachability analysis algorithms, to support verification of hybrid automata. For this purpose, we add to JuliaReach concrete and lazy discrete post operators. Lazy operations are particularly efficient in flowpipe based reachability analysis with long sequences of computations. The implemented algorithms are interchangeable and support all three reachability scenarios available in JuliaReach for the purely continuous setting: techniques to analyze linear systems using support functions and zonotopes as well as Taylor model based analysis for nonlinear systems. In order to evaluate our methods, we apply them to the Kuramoto-Lanchester model. This model exhibits highly nonlinear dynamics and can be easily scaled, and thus is well-suited to assess performance of reachability analysis methods for hybrid automata

    On the Trade-off Between Efficiency and Precision of Neural Abstraction

    Full text link
    Neural abstractions have been recently introduced as formal approximations of complex, nonlinear dynamical models. They comprise a neural ODE and a certified upper bound on the error between the abstract neural network and the concrete dynamical model. So far neural abstractions have exclusively been obtained as neural networks consisting entirely of ReLUReLU activation functions, resulting in neural ODE models that have piecewise affine dynamics, and which can be equivalently interpreted as linear hybrid automata. In this work, we observe that the utility of an abstraction depends on its use: some scenarios might require coarse abstractions that are easier to analyse, whereas others might require more complex, refined abstractions. We therefore consider neural abstractions of alternative shapes, namely either piecewise constant or nonlinear non-polynomial (specifically, obtained via sigmoidal activations). We employ formal inductive synthesis procedures to generate neural abstractions that result in dynamical models with these semantics. Empirically, we demonstrate the trade-off that these different neural abstraction templates have vis-a-vis their precision and synthesis time, as well as the time required for their safety verification (done via reachability computation). We improve existing synthesis techniques to enable abstraction of higher-dimensional models, and additionally discuss the abstraction of complex neural ODEs to improve the efficiency of reachability analysis for these models.Comment: To appear at QEST 202

    LNCS

    Get PDF
    We address the problem of analyzing the reachable set of a polynomial nonlinear continuous system by over-approximating the flowpipe of its dynamics. The common approach to tackle this problem is to perform a numerical integration over a given time horizon based on Taylor expansion and interval arithmetic. However, this method results to be very conservative when there is a large difference in speed between trajectories as time progresses. In this paper, we propose to use combinations of barrier functions, which we call piecewise barrier tube (PBT), to over-approximate flowpipe. The basic idea of PBT is that for each segment of a flowpipe, a coarse box which is big enough to contain the segment is constructed using sampled simulation and then in the box we compute by linear programming a set of barrier functions (called barrier tube or BT for short) which work together to form a tube surrounding the flowpipe. The benefit of using PBT is that (1) BT is independent of time and hence can avoid being stretched and deformed by time; and (2) a small number of BTs can form a tight over-approximation for the flowpipe, which means that the computation required to decide whether the BTs intersect the unsafe set can be reduced significantly. We implemented a prototype called PBTS in C++. Experiments on some benchmark systems show that our approach is effective
    corecore