skip to main content
research-article

Underminer: A Framework for Automatically Identifying Nonconverging Behaviors in Black-Box System Models

Published:06 December 2017Publication History
Skip Abstract Section

Abstract

Evaluation of industrial embedded control system designs is a time-consuming and imperfect process. While an ideal process would apply a formal verification technique such as model checking or theorem proving, these techniques do not scale to industrial design problems, and it is often difficult to use these techniques to verify performance aspects of control system designs, such as stability or convergence. For industrial designs, engineers rely on testing processes to identify critical or unexpected behaviors. We propose a novel framework called Underminer to improve the testing process; this is an automated technique to identify nonconverging behaviors in embedded control system designs. Underminer treats the system as a black box and lets the designer indicate the model parameters, inputs, and outputs that are of interest. It differentiates convergent from nonconvergent behaviors using Convergence Classifier Functions (CCFs).

The tool can be applied in the context of testing models created late in the controller development stage, where it assumes that the given model displays mostly convergent behavior and learns a CCF in an unsupervised fashion from such convergent model behaviors. This CCF is then used to guide a thorough exploration of the model with the help of optimization-guided techniques or adaptive sampling techniques, with the goal of identifying rare nonconvergent model behaviors. Underminer can also be used early in the development stage, where models may have some significant nonconvergent behaviors. Here, the framework permits designers to indicate their mental model for convergence by labeling behaviors as convergent/nonconvergent and then constructs a CCF using a supervised learning technique. In this use case, the goal is to use the CCF to test an improved design for the model. Underminer supports a number of convergence-like notions, such as those based on Lyapunov analysis and temporal logic, and also CCFs learned directly from labeled output behaviors using machine-learning techniques such as support vector machines and neural networks. We demonstrate the efficacy of Underminer by evaluating its performance on several academic as well as industrial examples.

References

  1. Y. S. R. Annapureddy, C. Liu, G. E. Fainekos, and S. Sankaranarayanan. 2011. S-TaLiRo: A tool for temporal logic falsification for hybrid systems. In TACAS. 254--257. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Balkan. 2017. Labeling for Not Stable System. Retrieved from http://www.cyphylab.ee.ucla.edu/labelingnotstablesystem/.Google ScholarGoogle Scholar
  3. A. Balkan, J. Deshmukh, J. Kapinski, and P. Tabuada. 2015. Simulation-guided contraction analysis. In Proc. of the 1st Indian Control Conference. 71--75.Google ScholarGoogle Scholar
  4. A. Balkan, P. Tabuada, J. V. Deshmukh, X. Jin, and J. Kapinski. 2016. Underminer: A framework for automatically identifying non-converging behaviors in black box system models. In 2016 International Conference on Embedded Software (EMSOFT’16). 7:1--7:10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. R. Bobiti and M. Lazar. 2015. A delta-sampling verification theorem for discrete-time, possibly discontinuous systems. In HSCC. 140--148. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C. Cortes and V. Vapnik. 1995. Support-vector networks. Mach. Learn. 20, 3 (Sept. 1995), 273--297. Google ScholarGoogle ScholarCross RefCross Ref
  7. T. Dang and T. Nahhal. 2009. Coverage-guided test generation for continuous and hybrid systems. Formal Methods Syst. Design 34, 2 (2009), 183--213. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. Donzé. 2010. Breach, a toolbox for verification and parameter synthesis of hybrid systems. In CAV. 167--170. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Donzé and O. Maler. 2010. Robust satisfaction of temporal logic over real-valued signals. In FORMATS. 92--106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. T. Dreossi, T. Dang, A. Donzé, J. Kapinski, X. Jin, and J. V. Deshmukh. 2015. Efficient guiding strategies for testing of temporal properties of hybrid systems. In NASA Formal Methods. 127--142.Google ScholarGoogle Scholar
  11. G. E. Fainekos and G. J. Pappas. 2009. Robustness of temporal logic specifications for continuous-time signals. Theor. Comp. Sci. 410, 42 (2009), 4262--4291. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. R. Geiselhart, R. H. Gielen, M. Lazar, and F. R. Wirth. 2014. An alternative converse Lyapunov theorem for discrete-time systems. Syst. Control Lett. 70 (2014), 49--59.Google ScholarGoogle ScholarCross RefCross Ref
  13. S. Haykin. 1998. Neural Networks: A Comprehensive Foundation (2nd ed.). Prentice Hall PTR, Upper Saddle River, NJ. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Huang, K. Zaseck, K. Butts, and I. Kolmanovsky. 2016. Rate-based model predictive controller for diesel engine air path: Design and experimental evaluation. IEEE Trans. Control Syst. Technol. 99 (2016), 1--14.Google ScholarGoogle Scholar
  15. ILOG. 2006. ILOG CPLEX: High-performance software for mathematical programming and optimization. Retrieved from http://www.ilog.com/products/cplex/.Google ScholarGoogle Scholar
  16. X. Jin, J. V. Deshmukh, J. Kapinski, K. Ueda, and K. Butts. 2014. Powertrain control verification benchmark. In HSCC. 253--262. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. A. Jones, Z. Kong, and C. Belta. 2014. Anomaly detection in cyber-physical systems: A formal methods approach. In CDC. 848--853.Google ScholarGoogle Scholar
  18. J. Kapinski, J. V. Deshmukh, S. Sankaranarayanan, and N. Aréchiga. 2014. Simulation-guided lyapunov analysis for hybrid dynamical systems. In HSCC. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. H. K. Khalil. 2002. Nonlinear Systems. Prentice Hall.Google ScholarGoogle Scholar
  20. Z. Kong, A. Jones, A. M. Ayala, E. A. Gol, and C. Belta. 2014. Temporal logic inference for classification and prediction from data. In HSCC. 273--282. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. Kozarev, J. Quindlen, J. How, and U. Topcu. 2016. Case studies in data-driven verification of dynamical systems. In HSCC. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. V. Lakshmikantham, S. Leela, and A. A. Martynyuk. 1990. Practical Stability of Nonlinear Systems. World Scientific.Google ScholarGoogle Scholar
  23. H. W. Lenstra. 1983. Integer programming with a fixed number of variables. Math. Oper. Res. 8, 4 (1983), 538--548. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. J. Lofberg. 2004. YALMIP: A toolbox for modeling and optimization in MATLAB. In 2004 IEEE International Conference on Robotics and Automation (IEEE Cat. No.04CH37508). 284--289.Google ScholarGoogle ScholarCross RefCross Ref
  25. O. Maler and D. Nickovic. 2004. Monitoring temporal properties of continuous signals. In FORMATS. 152--166.Google ScholarGoogle Scholar
  26. Mathworks. 2007. Using Simulink. MathWorks.Google ScholarGoogle Scholar
  27. R. Medhat, S. Ramesh, B. Bonakdarpour, and S. Fischmeister. 2015. A framework for mining hybrid automata from input/output traces. In International Conference on Embedded Software (EMSOFT’15). Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. B. Messner and D. Tilbury. Control Tutorials for MATLAB and Simulink. Retrieved from http://ctms.engin.umich.edu/.Google ScholarGoogle Scholar
  29. J. A. Nelder and R. Mead. 1965. A simplex method for function minimization. Comput. J. 7 (1965), 308--313.Google ScholarGoogle ScholarCross RefCross Ref
  30. S. Shankar Sastry. 1999. Nonlinear Systems: Analysis, Stability, and Control. Springer, New York.Google ScholarGoogle ScholarCross RefCross Ref
  31. K. C. Toh, M. J. Todd, and R. H. Tutuncu. 1998. SDPT3 - A MATLAB software package for semidefinite programming. Optim. Methods Softw. 11 (1998), 545--581.Google ScholarGoogle ScholarCross RefCross Ref
  32. U. Topcu, P. Seiler, and A. Packard. 2008. Local stability analysis using simulations and sum-of-squares programming. Automatica 44 (2008), 2669--2675. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. J. Wiens, E. Horvitz, and J. V. Guttag. 2012. Patient risk stratification for hospital-associated C. diff as a time-series classification task. In Advances in Neural Information Processing Systems 25, F. Pereira, C. J. C. Burges, L. Bottou, and K. Q. Weinberger (Eds.). Curran Associates, 467--475. Retrieved from http://papers.nips.cc/paper/4525-patient-risk-stratification-for-hospital-associated-c-diff-as-a-time-series-classification-task.pdf. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Underminer: A Framework for Automatically Identifying Nonconverging Behaviors in Black-Box System Models

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Embedded Computing Systems
          ACM Transactions on Embedded Computing Systems  Volume 17, Issue 1
          Special Issue on Autonomous Battery-Free Sensing and Communication, Special Issue on ESWEEK 2016 and Regular Papers
          January 2018
          630 pages
          ISSN:1539-9087
          EISSN:1558-3465
          DOI:10.1145/3136518
          Issue’s Table of Contents

          Copyright © 2017 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 6 December 2017
          • Revised: 1 June 2017
          • Accepted: 1 June 2017
          • Received: 1 February 2017
          Published in tecs Volume 17, Issue 1

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader