Robust control of timed systems Patricia Bouyer-Decitre LSV, CNRS - - PowerPoint PPT Presentation

robust control of timed systems
SMART_READER_LITE
LIVE PREVIEW

Robust control of timed systems Patricia Bouyer-Decitre LSV, CNRS - - PowerPoint PPT Presentation

Robust control of timed systems Patricia Bouyer-Decitre LSV, CNRS & ENS Cachan, France Based on joint works with Nicolas Markey, Pierre-Alain Reynier and Ocan Sankur. Acknowledgment to Nicolas and Ocan for slides. Support from ERC project


slide-1
SLIDE 1

Robust control of timed systems

Patricia Bouyer-Decitre

LSV, CNRS & ENS Cachan, France

Based on joint works with Nicolas Markey, Pierre-Alain Reynier and Ocan Sankur. Acknowledgment to Nicolas and Ocan for slides. Support from ERC project EQualIS.

1/38
slide-2
SLIDE 2 Introduction

Outline

  • 1. Introduction
  • 2. Robust “black-box” model-checking

Parameterized enlarged semantics Parameterized shrunk semantics

  • 3. Robust guided model-checking

Excess semantics Conservative semantics

  • 4. Conclusion
2/38
slide-3
SLIDE 3 Introduction

Time-dependent systems

We are interested in timed systems

3/38
slide-4
SLIDE 4 Introduction

Time-dependent systems

We are interested in timed systems

3/38
slide-5
SLIDE 5 Introduction

Model-checking and control

system:

[http://www.embedded.com]

✘ ✘

property:

4/38
slide-6
SLIDE 6 Introduction

Model-checking and control

system:

[http://www.embedded.com]

✘ ✘

property:

a! b? a? b!

AG(¬B.overfull ∧ ¬B.dried up)

4/38
slide-7
SLIDE 7 Introduction

Model-checking and control

system:

[http://www.embedded.com]

✘ ✘

property:

a! b? a? b!

AG(¬B.overfull ∧ ¬B.dried up)

algorithm

4/38
slide-8
SLIDE 8 Introduction

Model-checking and control

system:

[http://www.embedded.com]

✘ ✘

property:

a! b? a? b!

AG(¬B.overfull ∧ ¬B.dried up)

model-checking algorithm

yes/no

4/38
slide-9
SLIDE 9 Introduction

Model-checking and control

system:

[http://www.embedded.com]

✘ ✘

property:

a! b? a? b! ?

AG(¬B.overfull ∧ ¬B.dried up)

control/synthesis algorithm

a? b! 4/38
slide-10
SLIDE 10 Introduction

Reasoning about real-time systems

[AD94] Alur, Dill. A Theory of Timed Automata. Theor. Comp. Science, 1994.

Timed automata [AD94]

A timed automaton is made of a finite automaton-based structure

Example (A computer mouse)

idle left right

left button? right button? left click! left button? left double click! right click! right button? right double click!

5/38
slide-11
SLIDE 11 Introduction

Reasoning about real-time systems

[AD94] Alur, Dill. A Theory of Timed Automata. Theor. Comp. Science, 1994.

Timed automata [AD94]

A timed automaton is made of a finite automaton-based structure a set of clocks

Example (A computer mouse)

idle left right

left button? right button? left click! left button? left double click! right click! right button? right double click! x

5/38
slide-12
SLIDE 12 Introduction

Reasoning about real-time systems

[AD94] Alur, Dill. A Theory of Timed Automata. Theor. Comp. Science, 1994.

Timed automata [AD94]

A timed automaton is made of a finite automaton-based structure a set of clocks timing constraints on states and transitions

Example (A computer mouse)

idle left

x≤300

right

x≤300

left button? x := 0 right button? x := 0 x = 300 left click! x ≤ 300 left button? left double click! x = 300 right click! x ≤ 300 right button? right double click! x

5/38
slide-13
SLIDE 13 Introduction

Discrete-time semantics

[Alur91] Techniques for automatic verification of real-time systems. PhD thesis, 1991.

...because computers are digital!

6/38
slide-14
SLIDE 14 Introduction

Discrete-time semantics

[Alur91] Techniques for automatic verification of real-time systems. PhD thesis, 1991.

...because computers are digital!

Example [Alur91]

i

  • 1
NOT

[1,2]

  • 2
NOT

[1,2]

  • 3
NOT

[1,2]

  • 4
XOR

[1]

  • 5
XOR

[1]

  • 6
XOR

[1]

  • 7

[1]

OR

[1]

  • 8
  • under discrete-time, the output is always 0:

t i

6/38
slide-15
SLIDE 15 Introduction

Discrete-time semantics

[Alur91] Techniques for automatic verification of real-time systems. PhD thesis, 1991.

...because computers are digital!

Example [Alur91]

i

  • 1
NOT

[1,2]

  • 2
NOT

[1,2]

  • 3
NOT

[1,2]

  • 4
XOR

[1]

  • 5
XOR

[1]

  • 6
XOR

[1]

  • 7

[1]

OR

[1]

  • 8
  • under discrete-time, the output is always 0:

t i

6/38
slide-16
SLIDE 16 Introduction

Discrete-time semantics

[Alur91] Techniques for automatic verification of real-time systems. PhD thesis, 1991.

...because computers are digital!

Example [Alur91]

i

  • 1
NOT

[1,2]

  • 2
NOT

[1,2]

  • 3
NOT

[1,2]

  • 4
XOR

[1]

  • 5
XOR

[1]

  • 6
XOR

[1]

  • 7

[1]

OR

[1]

  • 8
  • under discrete-time, the output is always 0:

t i

6/38
slide-17
SLIDE 17 Introduction

Discrete-time semantics

[Alur91] Techniques for automatic verification of real-time systems. PhD thesis, 1991.

...because computers are digital!

Example [Alur91]

i

  • 1
NOT

[1,2]

  • 2
NOT

[1,2]

  • 3
NOT

[1,2]

  • 4
XOR

[1]

  • 5
XOR

[1]

  • 6
XOR

[1]

  • 7

[1]

OR

[1]

  • 8
  • under discrete-time, the output is always 0:

t i

6/38
slide-18
SLIDE 18 Introduction

Discrete-time semantics

[Alur91] Techniques for automatic verification of real-time systems. PhD thesis, 1991.

...because computers are digital!

Example [Alur91]

i

  • 1
NOT

[1,2]

  • 2
NOT

[1,2]

  • 3
NOT

[1,2]

  • 4
XOR

[1]

  • 5
XOR

[1]

  • 6
XOR

[1]

  • 7

[1]

OR

[1]

  • 8
  • under discrete-time, the output is always 0:

t i

6/38
slide-19
SLIDE 19 Introduction

Discrete-time semantics

[Alur91] Techniques for automatic verification of real-time systems. PhD thesis, 1991.

...because computers are digital!

Example [Alur91]

i

  • 1
NOT

[1,2]

  • 2
NOT

[1,2]

  • 3
NOT

[1,2]

  • 4
XOR

[1]

  • 5
XOR

[1]

  • 6
XOR

[1]

  • 7

[1]

OR

[1]

  • 8
  • under continuous-time, the output can be 1:

t i

6/38
slide-20
SLIDE 20 Introduction

Continuous-time semantics

...real-time models for real-time systems!

7/38
slide-21
SLIDE 21 Introduction

Continuous-time semantics

...real-time models for real-time systems!

Example

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

7/38
slide-22
SLIDE 22 Introduction

Continuous-time semantics

...real-time models for real-time systems!

Example

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

7/38
slide-23
SLIDE 23 Introduction

Continuous-time semantics

...real-time models for real-time systems!

Example

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

7/38
slide-24
SLIDE 24 Introduction

Continuous-time semantics

...real-time models for real-time systems!

Example

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

7/38
slide-25
SLIDE 25 Introduction

Continuous-time semantics

...real-time models for real-time systems!

Example

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

7/38
slide-26
SLIDE 26 Introduction

Continuous-time semantics

...real-time models for real-time systems!

Example

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

7/38
slide-27
SLIDE 27 Introduction

Continuous-time semantics

...real-time models for real-time systems!

Example

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

7/38
slide-28
SLIDE 28 Introduction

Continuous-time semantics

...real-time models for real-time systems!

Example

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

7/38
slide-29
SLIDE 29 Introduction

Continuous-time semantics

...real-time models for real-time systems!

Example

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

7/38
slide-30
SLIDE 30 Introduction

Continuous-time semantics

...real-time models for real-time systems!

Example

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

7/38
slide-31
SLIDE 31 Introduction

Continuous-time semantics

...real-time models for real-time systems!

Example

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

7/38
slide-32
SLIDE 32 Introduction

Continuous-time semantics

...real-time models for real-time systems!

Example

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

7/38
slide-33
SLIDE 33 Introduction

Continuous-time semantics

...real-time models for real-time systems!

Example

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

Theorem [AD94]

Reachability in timed automata is decidable (as well as many other important properties). Technical tool: region abstraction

7/38
slide-34
SLIDE 34 Introduction

Are we doing the right job?

The continuous-time semantics is an idealization of a physical system.

8/38
slide-35
SLIDE 35 Introduction

Are we doing the right job?

The continuous-time semantics is an idealization of a physical system. It might not be proper for implementation:

it assumes zero-delay transitions it assumes infinite precision of the clocks it assumes immediate communication between systems

8/38
slide-36
SLIDE 36 Introduction

Are we doing the right job?

The continuous-time semantics is an idealization of a physical system. It might not be proper for implementation:

it assumes zero-delay transitions it assumes infinite precision of the clocks it assumes immediate communication between systems

It may generate timing anomalies

8/38
slide-37
SLIDE 37 Introduction

Are we doing the right job?

The continuous-time semantics is an idealization of a physical system. It might not be proper for implementation:

it assumes zero-delay transitions it assumes infinite precision of the clocks it assumes immediate communication between systems

It may generate timing anomalies It does not exclude non-realizable behaviours:

not only Zeno behaviours many convergence phenomena are hidden this requires infinite precision and might not be realizable

8/38
slide-38
SLIDE 38 Introduction

Are we doing the right job?

The continuous-time semantics is an idealization of a physical system. It might not be proper for implementation:

it assumes zero-delay transitions it assumes infinite precision of the clocks it assumes immediate communication between systems

It may generate timing anomalies It does not exclude non-realizable behaviours:

not only Zeno behaviours many convergence phenomena are hidden this requires infinite precision and might not be realizable

Important questions

Is the real system correct when it is proven correct on the model? Does actual work transfer to real-world systems? To what extent?

8/38
slide-39
SLIDE 39 Introduction

Example 1: Imprecision on clock values

[ACS10] Abdellatif, Combaz, Sifakis. Model-based implementation of real-time applications. Int. Conf. Embedded Software, ACM 2010.

Frame capture [ACS10]

frame 0 frame 1 frame 2 frame 3 frame 4 frame 5

2 t.u.

  • encod. 0
  • encod. 1
  • encod. 2
  • encod. 3
  • encod. 4

2 t.u.

9/38
slide-40
SLIDE 40 Introduction

Example 1: Imprecision on clock values

[ACS10] Abdellatif, Combaz, Sifakis. Model-based implementation of real-time applications. Int. Conf. Embedded Software, ACM 2010.

Frame capture [ACS10]

frame 0 frame 1 frame 2 frame 3 frame 4 frame 5

2 t.u.

  • encod. 0
  • encod. 1
  • encod. 2
  • encod. 3
  • encod. 4

2 + ǫ A frame will eventually be skipped

9/38
slide-41
SLIDE 41 Introduction

Example 2: Strict timing constraints

[KLL+97] Kristoffersen, Laroussinie, Larsen, Pettersson, Yi. A compositional proof of a real-time mutual exclusion protocol. TAPSOFT, 1997.

Mutual exclusion protocol [KLL+97]

Pid

xid≤2 r==0 xid:=0 r:=id xid:=0 r:=0 xid:=0 r=id xid>2 r:=0

10/38
slide-42
SLIDE 42 Introduction

Example 2: Strict timing constraints

[KLL+97] Kristoffersen, Laroussinie, Larsen, Pettersson, Yi. A compositional proof of a real-time mutual exclusion protocol. TAPSOFT, 1997.

Mutual exclusion protocol [KLL+97]

Pid

xid≤2 r==0 xid:=0 r:=id xid:=0 r:=0 xid:=0 r=id xid>2 r:=0

When P1 and P2 run in parallel (sharing variable r), the state where both of them are in is not reachable.

10/38
slide-43
SLIDE 43 Introduction

Example 2: Strict timing constraints

[KLL+97] Kristoffersen, Laroussinie, Larsen, Pettersson, Yi. A compositional proof of a real-time mutual exclusion protocol. TAPSOFT, 1997.

Mutual exclusion protocol [KLL+97]

Pid

xid≤2 r==0 xid:=0 r:=id xid:=0 r:=0 xid:=0 r=id xid>2 r:=0

When P1 and P2 run in parallel (sharing variable r), the state where both of them are in is not reachable. This property is lost when xid > 2 is replaced with xid ≥ 2.

10/38
slide-44
SLIDE 44 Introduction

Example 3: Scheduling and timing anomaly

[AAM06] Abdeddaim, Asarin, Maler. Scheduling with timed automata. Theor. Comp. Science, 2006.

Scheduling analysis with timed automata [AAM06] Goal: analyze a work-conserving scheduling policy on given scenarios (no machine is idle if a task is waiting for execution)

Example of a scenario

1 2 3 4 5 6 7 M2 M1 A C B D E with the dependency constraints: A → B and C → D, E.

1

A, D, E must be scheduled on machine M1

2

B, C must be scheduled on machine M2

3

C starts no sooner than 2 time units

11/38
slide-45
SLIDE 45 Introduction

Example 3: Scheduling and timing anomaly

Example of a scenario

1 2 3 4 5 6 7 M2 M1 A C B D E Schedulable in 6 time units

11/38
slide-46
SLIDE 46 Introduction

Example 3: Scheduling and timing anomaly

Example of a scenario

1 2 3 4 5 6 7 M2 M1 A C B D E Schedulable in 6 time units Unexpectedly, the duration of A drops to 1.999

11/38
slide-47
SLIDE 47 Introduction

Example 3: Scheduling and timing anomaly

Example of a scenario

1 2 3 4 5 6 7 M2 M1 A C B D E Schedulable in 6 time units Unexpectedly, the duration of A drops to 1.999 1 2 3 4 5 6 7 M2 M1 A C B D E is not work-conserving

11/38
slide-48
SLIDE 48 Introduction

Example 3: Scheduling and timing anomaly

Example of a scenario

1 2 3 4 5 6 7 M2 M1 A C B D E Schedulable in 6 time units Unexpectedly, the duration of A drops to 1.999 1 2 3 4 5 6 7 M2 M1 A C B D E is not work-conserving 1 2 3 4 5 6 7 8 M2 M1 A B C D E is work-conserving and completes in 7.999 t.u.

11/38
slide-49
SLIDE 49 Introduction

Example 3: Scheduling and timing anomaly

Example of a scenario

1 2 3 4 5 6 7 M2 M1 A C B D E Schedulable in 6 time units Unexpectedly, the duration of A drops to 1.999 1 2 3 4 5 6 7 M2 M1 A C B D E is not work-conserving 1 2 3 4 5 6 7 8 M2 M1 A B C D E is work-conserving and completes in 7.999 t.u. Standard analysis does not capture this timing anomaly

11/38
slide-50
SLIDE 50 Introduction

Example 4: Zeno behaviours

x<1 ∧ y<1 x:=0 y=1

y x 1 1

12/38
slide-51
SLIDE 51 Introduction

Example 4: Zeno behaviours

[HS11] Herbreteau, Srivathsan. Coarse abstractions make Zeno behaviours difficult to detect, Logic. Meth. Comp. Science, 2011.

x<1 ∧ y<1 x:=0 y=1

y x 1 1 Those are easy to detect and can be handled; [HS11]

12/38
slide-52
SLIDE 52 Introduction

Example 4: Zeno behaviours

[HS11] Herbreteau, Srivathsan. Coarse abstractions make Zeno behaviours difficult to detect, Logic. Meth. Comp. Science, 2011.

x<1 ∧ y<1 x:=0 y=1

y x 1 1 Those are easy to detect and can be handled; [HS11] They are easy to remove by construction.

12/38
slide-53
SLIDE 53 Introduction

Example 5: More complex convergence phenomena

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2

13/38
slide-54
SLIDE 54 Introduction

Example 5: More complex convergence phenomena

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

13/38
slide-55
SLIDE 55 Introduction

Example 5: More complex convergence phenomena

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

13/38
slide-56
SLIDE 56 Introduction

Example 5: More complex convergence phenomena

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

13/38
slide-57
SLIDE 57 Introduction

Example 5: More complex convergence phenomena

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

13/38
slide-58
SLIDE 58 Introduction

Example 5: More complex convergence phenomena

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

13/38
slide-59
SLIDE 59 Introduction

Example 5: More complex convergence phenomena

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

13/38
slide-60
SLIDE 60 Introduction

Example 5: More complex convergence phenomena

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

13/38
slide-61
SLIDE 61 Introduction

Example 5: More complex convergence phenomena

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

13/38
slide-62
SLIDE 62 Introduction

Example 5: More complex convergence phenomena

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

13/38
slide-63
SLIDE 63 Introduction

Example 5: More complex convergence phenomena

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

13/38
slide-64
SLIDE 64 Introduction

Example 5: More complex convergence phenomena

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

13/38
slide-65
SLIDE 65 Introduction

Example 5: More complex convergence phenomena

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

13/38
slide-66
SLIDE 66 Introduction

Example 5: More complex convergence phenomena

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

13/38
slide-67
SLIDE 67 Introduction

Example 5: More complex convergence phenomena

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

Value of clock x when hitting

is converging, even though global time diverges

13/38
slide-68
SLIDE 68 Introduction

The goal

Add robustness to the theory of timed automata

14/38
slide-69
SLIDE 69 Introduction

The goal

Add robustness to the theory of timed automata We need to understand what is the real system behind the mathematical model, and also which implementation we have in mind, if any.

14/38
slide-70
SLIDE 70 Introduction

The goal

Add robustness to the theory of timed automata We need to understand what is the real system behind the mathematical model, and also which implementation we have in mind, if any. Aim: provide frameworks to build correct systems

14/38
slide-71
SLIDE 71 Introduction

The goal

Add robustness to the theory of timed automata We need to understand what is the real system behind the mathematical model, and also which implementation we have in mind, if any. Aim: provide frameworks to build robustly correct systems

14/38
slide-72
SLIDE 72 Introduction

The goal

Add robustness to the theory of timed automata We need to understand what is the real system behind the mathematical model, and also which implementation we have in mind, if any. Aim: provide frameworks to build robustly correct systems Robustness calls for specific theories for each application areas

14/38
slide-73
SLIDE 73 Introduction

The goal

Add robustness to the theory of timed automata We need to understand what is the real system behind the mathematical model, and also which implementation we have in mind, if any. Aim: provide frameworks to build robustly correct systems Robustness calls for specific theories for each application areas

Rest of the talk

We present a couple of frameworks that have been developed recently in this context

14/38
slide-74
SLIDE 74 Robust “black-box” model-checking

Outline

  • 1. Introduction
  • 2. Robust “black-box” model-checking

Parameterized enlarged semantics Parameterized shrunk semantics

  • 3. Robust guided model-checking

Excess semantics Conservative semantics

  • 4. Conclusion
15/38
slide-75
SLIDE 75 Robust “black-box” model-checking

Robust “black-box” model-checking approach

Idea

Capture any real (or approximate) behaviours (e.g. the implementation) in the verification process

16/38
slide-76
SLIDE 76 Robust “black-box” model-checking

Robust “black-box” model-checking approach

Idea

Capture any real (or approximate) behaviours (e.g. the implementation) in the verification process Due to imprecisions, “standard” correctness of A ⇒ correctness of Areal

16/38
slide-77
SLIDE 77 Robust “black-box” model-checking

Robust “black-box” model-checking approach

Idea

Capture any real (or approximate) behaviours (e.g. the implementation) in the verification process Due to imprecisions, “standard” correctness of A ⇒ correctness of Areal We aim at proposing frameworks in which we will ensure the correctness of the real behaviour of the system

16/38
slide-78
SLIDE 78 Robust “black-box” model-checking

Robust “black-box” model-checking approach

Idea

Capture any real (or approximate) behaviours (e.g. the implementation) in the verification process Due to imprecisions, “standard” correctness of A ⇒ correctness of Areal We aim at proposing frameworks in which we will ensure the correctness of the real behaviour of the system We describe two such frameworks:

1

either we implement A and we prove: “robust” correctness of A ⇒ correctness of Areal

16/38
slide-79
SLIDE 79 Robust “black-box” model-checking

Robust “black-box” model-checking approach

Idea

Capture any real (or approximate) behaviours (e.g. the implementation) in the verification process Due to imprecisions, “standard” correctness of A ⇒ correctness of Areal We aim at proposing frameworks in which we will ensure the correctness of the real behaviour of the system We describe two such frameworks:

1

either we implement A and we prove: “robust” correctness of A ⇒ correctness of Areal

2
  • r we build and implement B, and we prove:

correctness of A ⇒ “robust” correctness of B ⇒ correctness of Breal

16/38
slide-80
SLIDE 80 Robust “black-box” model-checking

Outline

  • 1. Introduction
  • 2. Robust “black-box” model-checking

Parameterized enlarged semantics Parameterized shrunk semantics

  • 3. Robust guided model-checking

Excess semantics Conservative semantics

  • 4. Conclusion
17/38
slide-81
SLIDE 81 Robust “black-box” model-checking

Parameterized enlarged semantics for timed automata

A transition can be taken at any time in [t − δ; t + δ]

18/38
slide-82
SLIDE 82 Robust “black-box” model-checking

Parameterized enlarged semantics for timed automata

A transition can be taken at any time in [t − δ; t + δ]

Example

Given a parameter δ,

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2

is transformed into

1−δ≤x≤1+δ y:=0 x≤2+δ, x:=0 y≥2−δ, y:=0 x≤δ ∧ y≥2−δ

18/38
slide-83
SLIDE 83 Robust “black-box” model-checking

Parameterized enlarged semantics – Discussion

[DDR04] De Wulf, Doyen, Raskin. Almost ASAP semantics: From timed models to timed implementations HSCC, 2004. [SBM11] Sankur, Bouyer, Markey. Shrinking Timed Automata. FSTTCS, 2011.

What is the relevance of this semantics?

This is a worst-case approach This captures approximate behaviours of the system One can define program semantics such that for every ǫ > 0: A ⊆ programǫ(A) ⊆ Af (ǫ) ǫ: parameters of the semantics

19/38
slide-84
SLIDE 84 Robust “black-box” model-checking

Parameterized enlarged semantics – Discussion

What is the relevance of this semantics?

This is a worst-case approach This captures approximate behaviours of the system One can define program semantics such that for every ǫ > 0: A ⊆ programǫ(A) ⊆ Af (ǫ) ǫ: parameters of the semantics

Methodology

Design A Verify Aδ (better if δ is a parameter) Implement A

19/38
slide-85
SLIDE 85 Robust “black-box” model-checking

Parameterized enlarged semantics – Discussion

What is the relevance of this semantics?

This is a worst-case approach This captures approximate behaviours of the system One can define program semantics such that for every ǫ > 0: A ⊆ programǫ(A) ⊆ Af (ǫ) ǫ: parameters of the semantics

Methodology

Design A Verify Aδ (better if δ is a parameter) Implement A This is good for designing systems with simple timing constraints (e.g. equalities).

19/38
slide-86
SLIDE 86 Robust “black-box” model-checking

Parameterized enlarged semantics – Algorithmics

It adds extra behaviours, however small may be parameter δ

20/38
slide-87
SLIDE 87 Robust “black-box” model-checking

Parameterized enlarged semantics – Algorithmics

It adds extra behaviours, however small may be parameter δ

Example

y x 1 1 2 2 3 3 x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2

20/38
slide-88
SLIDE 88 Robust “black-box” model-checking

Parameterized enlarged semantics – Algorithmics

It adds extra behaviours, however small may be parameter δ

Example

y x 1 1 2 2 3 3 x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2

20/38
slide-89
SLIDE 89 Robust “black-box” model-checking

Parameterized enlarged semantics – Algorithmics

It adds extra behaviours, however small may be parameter δ

Example

y x 1 1 2 2 3 3 x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2

20/38
slide-90
SLIDE 90 Robust “black-box” model-checking

Parameterized enlarged semantics – Algorithmics

It adds extra behaviours, however small may be parameter δ

Example

y x 1 1 2 2 3 3 x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2

20/38
slide-91
SLIDE 91 Robust “black-box” model-checking

Parameterized enlarged semantics – Algorithmics

It adds extra behaviours, however small may be parameter δ

Example

y x 1 1 2 2 3 3 x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2

20/38
slide-92
SLIDE 92 Robust “black-box” model-checking

Parameterized enlarged semantics – Algorithmics

It adds extra behaviours, however small may be parameter δ

Example

y x 1 1 2 2 3 3 x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2

20/38
slide-93
SLIDE 93 Robust “black-box” model-checking

Parameterized enlarged semantics – Algorithmics

It adds extra behaviours, however small may be parameter δ

Example

y x 1 1 2 2 3 3 x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2

20/38
slide-94
SLIDE 94 Robust “black-box” model-checking

Parameterized enlarged semantics – Algorithmics

It adds extra behaviours, however small may be parameter δ

Example

y x 1 1 2 2 3 3 x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2

20/38
slide-95
SLIDE 95 Robust “black-box” model-checking

Parameterized enlarged semantics – Algorithmics

It adds extra behaviours, however small may be parameter δ

Example

y x 1 1 2 2 3 3 y x 1 1 2 2 3 3 1−δ≤x≤1+δ y:=0 x≤2+δ, x:=0 y≥2−δ, y:=0 x≤δ ∧ y≥2−δ

20/38
slide-96
SLIDE 96 Robust “black-box” model-checking

Parameterized enlarged semantics – Algorithmics

It adds extra behaviours, however small may be parameter δ

Example

y x 1 1 2 2 3 3 y x 1 1 2 2 3 3 1−δ≤x≤1+δ y:=0 x≤2+δ, x:=0 y≥2−δ, y:=0 x≤δ ∧ y≥2−δ

20/38
slide-97
SLIDE 97 Robust “black-box” model-checking

Parameterized enlarged semantics – Algorithmics

It adds extra behaviours, however small may be parameter δ

Example

y x 1 1 2 2 3 3 y x 1 1 2 2 3 3 1−δ≤x≤1+δ y:=0 x≤2+δ, x:=0 y≥2−δ, y:=0 x≤δ ∧ y≥2−δ

20/38
slide-98
SLIDE 98 Robust “black-box” model-checking

Parameterized enlarged semantics – Algorithmics

It adds extra behaviours, however small may be parameter δ

Example

y x 1 1 2 2 3 3 y x 1 1 2 2 3 3 1−δ≤x≤1+δ y:=0 x≤2+δ, x:=0 y≥2−δ, y:=0 x≤δ ∧ y≥2−δ

20/38
slide-99
SLIDE 99 Robust “black-box” model-checking

Parameterized enlarged semantics – Algorithmics

It adds extra behaviours, however small may be parameter δ

Example

y x 1 1 2 2 3 3 y x 1 1 2 2 3 3 1−δ≤x≤1+δ y:=0 x≤2+δ, x:=0 y≥2−δ, y:=0 x≤δ ∧ y≥2−δ

20/38
slide-100
SLIDE 100 Robust “black-box” model-checking

Parameterized enlarged semantics – Algorithmics

It adds extra behaviours, however small may be parameter δ

Example

y x 1 1 2 2 3 3 y x 1 1 2 2 3 3 1−δ≤x≤1+δ y:=0 x≤2+δ, x:=0 y≥2−δ, y:=0 x≤δ ∧ y≥2−δ

20/38
slide-101
SLIDE 101 Robust “black-box” model-checking

Parameterized enlarged semantics – Algorithmics

It adds extra behaviours, however small may be parameter δ

Example

y x 1 1 2 2 3 3 y x 1 1 2 2 3 3 1−δ≤x≤1+δ y:=0 x≤2+δ, x:=0 y≥2−δ, y:=0 x≤δ ∧ y≥2−δ

20/38
slide-102
SLIDE 102 Robust “black-box” model-checking

Parameterized enlarged semantics – Algorithmics

It adds extra behaviours, however small may be parameter δ

Example

y x 1 1 2 2 3 3 y x 1 1 2 2 3 3 1−δ≤x≤1+δ y:=0 x≤2+δ, x:=0 y≥2−δ, y:=0 x≤δ ∧ y≥2−δ

20/38
slide-103
SLIDE 103 Robust “black-box” model-checking

Parameterized enlarged semantics – Algorithmics

It adds extra behaviours, however small may be parameter δ

Example

y x 1 1 2 2 3 3 y x 1 1 2 2 3 3 1−δ≤x≤1+δ y:=0 x≤2+δ, x:=0 y≥2−δ, y:=0 x≤δ ∧ y≥2−δ

20/38
slide-104
SLIDE 104 Robust “black-box” model-checking

Parameterized enlarged semantics – Algorithmics

It adds extra behaviours, however small may be parameter δ

Example

y x 1 1 2 2 3 3 y x 1 1 2 2 3 3 1−δ≤x≤1+δ y:=0 x≤2+δ, x:=0 y≥2−δ, y:=0 x≤δ ∧ y≥2−δ

20/38
slide-105
SLIDE 105 Robust “black-box” model-checking

Parameterized enlarged semantics – Algorithmics

It adds extra behaviours, however small may be parameter δ

Example

y x 1 1 2 2 3 3 y x 1 1 2 2 3 3 1−δ≤x≤1+δ y:=0 x≤2+δ, x:=0 y≥2−δ, y:=0 x≤δ ∧ y≥2−δ

20/38
slide-106
SLIDE 106 Robust “black-box” model-checking

Parameterized enlarged semantics – Algorithmics

It adds extra behaviours, however small may be parameter δ

Example

y x 1 1 2 2 3 3 y x 1 1 2 2 3 3 1−δ≤x≤1+δ y:=0 x≤2+δ, x:=0 y≥2−δ, y:=0 x≤δ ∧ y≥2−δ

20/38
slide-107
SLIDE 107 Robust “black-box” model-checking

Parameterized enlarged semantics – Algorithmics

It adds extra behaviours, however small may be parameter δ

The (parameterized) robust model-checking problem

It asks whether there is some δ0 > 0 such that for every 0 ≤ δ ≤ δ0, Aδ | = ϕ.

20/38
slide-108
SLIDE 108 Robust “black-box” model-checking

Parameterized enlarged semantics – Algorithmics

It adds extra behaviours, however small may be parameter δ

The (parameterized) robust model-checking problem

It asks whether there is some δ0 > 0 such that for every 0 ≤ δ ≤ δ0, Aδ | = ϕ. When δ is small, truth of ϕ is independent of δ

20/38
slide-109
SLIDE 109 Robust “black-box” model-checking

Parameterized enlarged semantics – Algorithmics

It adds extra behaviours, however small may be parameter δ

The (parameterized) robust model-checking problem

It asks whether there is some δ0 > 0 such that for every 0 ≤ δ ≤ δ0, Aδ | = ϕ. When δ is small, truth of ϕ is independent of δ It can be computed using a simple extension of the region automaton

20/38
slide-110
SLIDE 110 Robust “black-box” model-checking

Parameterized enlarged semantics – Algorithmics

[Puri00] Puri. Dynamical properties of timed automata. Disc. Event Dyn. Syst., 2000. [DDMR08] De Wulf, Doyen, Markey, Raskin. Robust safety of timed automata. FMSD, 2008. [BMR06] Bouyer, Markey, Reynier. Robust model-checking of timed automata. LATIN, 2006. [BMR08] Bouyer, Markey, Reynier. Robust analysis of timed automata via channel machines. FoSSaCS, 2008.

It adds extra behaviours, however small may be parameter δ

The (parameterized) robust model-checking problem

It asks whether there is some δ0 > 0 such that for every 0 ≤ δ ≤ δ0, Aδ | = ϕ. When δ is small, truth of ϕ is independent of δ It can be computed using a simple extension of the region automaton

Theorem

Robust model-checking of reachability, B¨ uchi, LTL, CoflatMTL properties is decidable. Complexities are those of standard non robust model-checking problems.

20/38
slide-111
SLIDE 111 Robust “black-box” model-checking

Outline

  • 1. Introduction
  • 2. Robust “black-box” model-checking

Parameterized enlarged semantics Parameterized shrunk semantics

  • 3. Robust guided model-checking

Excess semantics Conservative semantics

  • 4. Conclusion
21/38
slide-112
SLIDE 112 Robust “black-box” model-checking

Parameterized shrunk semantics for timed automata

[SBM11] Sankur, Bouyer, Markey. Shrinking Timed Automata. FSTTCS, 2011.

A constraint [a, b] is shrunk to [a + kδ; b − hδ]

22/38
slide-113
SLIDE 113 Robust “black-box” model-checking

Parameterized shrunk semantics for timed automata

[SBM11] Sankur, Bouyer, Markey. Shrinking Timed Automata. FSTTCS, 2011.

A constraint [a, b] is shrunk to [a + kδ; b − hδ]

Why should we do that?

Abstract model Real-world model

1≤x≤2

22/38
slide-114
SLIDE 114 Robust “black-box” model-checking

Parameterized shrunk semantics for timed automata

[SBM11] Sankur, Bouyer, Markey. Shrinking Timed Automata. FSTTCS, 2011.

A constraint [a, b] is shrunk to [a + kδ; b − hδ]

Why should we do that?

Abstract model Real-world model

1≤x≤2 1−∆≤x≤2+∆

22/38
slide-115
SLIDE 115 Robust “black-box” model-checking

Parameterized shrunk semantics for timed automata

[SBM11] Sankur, Bouyer, Markey. Shrinking Timed Automata. FSTTCS, 2011.

A constraint [a, b] is shrunk to [a + kδ; b − hδ]

Why should we do that?

Abstract model Real-world model

1≤x≤2 1+δ′≤x≤2−δ 1−∆≤x≤2+∆

22/38
slide-116
SLIDE 116 Robust “black-box” model-checking

Parameterized shrunk semantics for timed automata

[SBM11] Sankur, Bouyer, Markey. Shrinking Timed Automata. FSTTCS, 2011.

A constraint [a, b] is shrunk to [a + kδ; b − hδ]

Why should we do that?

Abstract model Real-world model

1≤x≤2 1+δ′≤x≤2−δ 1−∆≤x≤2+∆ 1+δ′−∆≤x≤2−δ+∆

22/38
slide-117
SLIDE 117 Robust “black-box” model-checking

Parameterized shrunk semantics for timed automata

[SBM11] Sankur, Bouyer, Markey. Shrinking Timed Automata. FSTTCS, 2011.

A constraint [a, b] is shrunk to [a + kδ; b − hδ]

Why should we do that?

Abstract model Real-world model

1≤x≤2 1+δ′≤x≤2−δ 1−∆≤x≤2+∆ 1+δ′−∆≤x≤2−δ+∆

It is fine as soon as [1 + δ′ − ∆; 2 − δ + ∆] ⊆ [1; 2], which is the case when δ, δ′ ≥ ∆.

22/38
slide-118
SLIDE 118 Robust “black-box” model-checking

Parameterized shrunk semantics for timed automata

[SBM11] Sankur, Bouyer, Markey. Shrinking Timed Automata. FSTTCS, 2011.

A constraint [a, b] is shrunk to [a + kδ; b − hδ]

Summary of the approach

Shrink the clock constraints in the model, to prevent additional behaviour in the implementation

If B = A−kδ, then B ⊆ programǫ(B) ⊆ Bf (ǫ) = A−kδ+f (ǫ) ⊆ A

22/38
slide-119
SLIDE 119 Robust “black-box” model-checking

Parameterized shrunk semantics – Discussion

What is the relevance of that approach?

Anticipate imprecisions to prevent additional behaviours in the real-world

23/38
slide-120
SLIDE 120 Robust “black-box” model-checking

Parameterized shrunk semantics – Discussion

What is the relevance of that approach?

Anticipate imprecisions to prevent additional behaviours in the real-world

Methodology

Design and verify A Implement A−kδ (parameters are k and δ)

23/38
slide-121
SLIDE 121 Robust “black-box” model-checking

Parameterized shrunk semantics – Discussion

What is the relevance of that approach?

Anticipate imprecisions to prevent additional behaviours in the real-world

Methodology

Design and verify A Implement A−kδ (parameters are k and δ) This is good for designing systems with strong/hard timing constraints

23/38
slide-122
SLIDE 122 Robust “black-box” model-checking

Parameterized shrunk semantics – Discussion

What is the relevance of that approach?

Anticipate imprecisions to prevent additional behaviours in the real-world

Methodology

Design and verify A Implement A−kδ (parameters are k and δ) This is good for designing systems with strong/hard timing constraints

  • Problem

Make sure that no important behaviours are lost in A−kδ!!

23/38
slide-123
SLIDE 123 Robust “black-box” model-checking

Parameterized shrunk semantics – Algorihmics

The (parameterized) shrinkability problem

Find parameters k and δ such that: A ⊑t.a. A−kδ (or F ⊑t.a. A−kδ for some finite automaton F) [shrinkability w.r.t. untimed simulation] A−kδ is non-blocking whenever A is non-blocking [shrinkability w.r.t. non-blockingness]

24/38
slide-124
SLIDE 124 Robust “black-box” model-checking

Parameterized shrunk semantics – Algorihmics

[San13] Sankur. Shrinktech: A tool for the robustness analysis of timed automata. CAV, 2013.

The (parameterized) shrinkability problem

Find parameters k and δ such that: A ⊑t.a. A−kδ (or F ⊑t.a. A−kδ for some finite automaton F) [shrinkability w.r.t. untimed simulation] A−kδ is non-blocking whenever A is non-blocking [shrinkability w.r.t. non-blockingness]

Theorem

Parameterized shrinkability can be decided (in exponential time). Challenge: take care of the accumulation of perturbations Technical tools: parameterized shrunk DBM, max-plus equations Tool Shrinktech developed by Ocan Sankur [San13] http://www.lsv.ens-cachan.fr/Software/shrinktech/

24/38
slide-125
SLIDE 125 Robust “black-box” model-checking

Example

y≤1∧u≥0 u,y:=0 y≤1∧1≤x u≥0, u,x:=0 u≥0∧y≤1 u,y:=0 u,x,y:=0

25/38
slide-126
SLIDE 126 Robust “black-box” model-checking

Example

y≤1∧u≥0 u,y:=0 y≤1∧1≤x u≥0, u,x:=0 u≥0∧y≤1 u,y:=0 u,x,y:=0

The largest shrunk automaton which is correct w.r.t. untimed simulation and non-blockingness is:

3δ≤x∧y≤1−δ∧u≥δ y−x≤1−4δ∧u≥δ u,y:=0 y≤1−2δ∧1+δ≤x u≥δ∧x−y≥3δ u,y:=0 u≥δ∧y≤1−δ u,y:=0 u,x,y:=0

25/38
slide-127
SLIDE 127 Robust guided model-checking

Outline

  • 1. Introduction
  • 2. Robust “black-box” model-checking

Parameterized enlarged semantics Parameterized shrunk semantics

  • 3. Robust guided model-checking

Excess semantics Conservative semantics

  • 4. Conclusion
26/38
slide-128
SLIDE 128 Robust guided model-checking

Robust strategy synthesis

In this talk, a strategy in a timed automaton is a way to resolve (time and action) non-determinism

27/38
slide-129
SLIDE 129 Robust guided model-checking

Robust strategy synthesis

In this talk, a strategy in a timed automaton is a way to resolve (time and action) non-determinism

Example

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

Strategy: in location with value x, delay 2−x

2

27/38
slide-130
SLIDE 130 Robust guided model-checking

Robust strategy synthesis

In this talk, a strategy in a timed automaton is a way to resolve (time and action) non-determinism

Example

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

Strategy: in location with value x, delay 2−x

2

This strategy requires infinite precision

27/38
slide-131
SLIDE 131 Robust guided model-checking

Robust strategy synthesis

In this talk, a strategy in a timed automaton is a way to resolve (time and action) non-determinism

Example

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

Strategy: in location with value x, delay 2−x

2

This strategy requires infinite precision In practice, when x is close to 2, no additional delay is supported: the run is theoretically infinite, but it is actually blocking

27/38
slide-132
SLIDE 132 Robust guided model-checking

Robust strategy synthesis

In this talk, a strategy in a timed automaton is a way to resolve (time and action) non-determinism

Example

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2 y x 1 1 2 2

Strategy: in location with value x, delay 2−x

2

This strategy requires infinite precision In practice, when x is close to 2, no additional delay is supported: the run is theoretically infinite, but it is actually blocking And that is unavoidable

27/38
slide-133
SLIDE 133 Robust guided model-checking

Robust strategy synthesis

In this talk, a strategy in a timed automaton is a way to resolve (time and action) non-determinism

Idea

Add robustness to strategies, and adapt the behaviour of the system to previous imprecisions develop a theory of robust strategies that tolerate errors/imprecisions and avoid convergence

27/38
slide-134
SLIDE 134 Robust guided model-checking

Game semantics of a timed automaton

Game semantics Gδ(A) of timed automaton A...

... between Controller and Perturbator: from (ℓ, v), Controller suggests a delay d ≥ δ and a next edge e = (ℓ

g,Y

− − → ℓ′) that is available after delay d Perturbator then chooses a perturbation ǫ ∈ [−δ; +δ] Next state is (ℓ′, (v + d + ǫ)[Y ← 0])

28/38
slide-135
SLIDE 135 Robust guided model-checking

Game semantics of a timed automaton

Game semantics Gδ(A) of timed automaton A...

... between Controller and Perturbator: from (ℓ, v), Controller suggests a delay d ≥ δ and a next edge e = (ℓ

g,Y

− − → ℓ′) that is available after delay d Perturbator then chooses a perturbation ǫ ∈ [−δ; +δ] Next state is (ℓ′, (v + d + ǫ)[Y ← 0]) Note: when δ = 0, this is the standard semantics of timed automata.

28/38
slide-136
SLIDE 136 Robust guided model-checking

Game semantics of a timed automaton

Game semantics Gδ(A) of timed automaton A...

... between Controller and Perturbator: from (ℓ, v), Controller suggests a delay d ≥ δ and a next edge e = (ℓ

g,Y

− − → ℓ′) that is available after delay d Perturbator then chooses a perturbation ǫ ∈ [−δ; +δ] Next state is (ℓ′, (v + d + ǫ)[Y ← 0]) Note: when δ = 0, this is the standard semantics of timed automata. A δ-robust strategy for Controller is then a strategy that satisfies the expected property, whatever plays Perturbator.

28/38
slide-137
SLIDE 137 Robust guided model-checking

Outline

  • 1. Introduction
  • 2. Robust “black-box” model-checking

Parameterized enlarged semantics Parameterized shrunk semantics

  • 3. Robust guided model-checking

Excess semantics Conservative semantics

  • 4. Conclusion
29/38
slide-138
SLIDE 138 Robust guided model-checking

The excess game semantics

[BMS12] Bouyer, Markey, Sankur. Robust reachability in timed automata: A game-based approach. ICALP, 2012.

Constraints may not be satisfied after the perturbation: that is,

  • nly v + d should satisfy g
30/38
slide-139
SLIDE 139 Robust guided model-checking

The excess game semantics

[BMS12] Bouyer, Markey, Sankur. Robust reachability in timed automata: A game-based approach. ICALP, 2012.

Constraints may not be satisfied after the perturbation: that is,

  • nly v + d should satisfy g

Example

x=y=1 y:=0

30/38
slide-140
SLIDE 140 Robust guided model-checking

The excess game semantics

[BMS12] Bouyer, Markey, Sankur. Robust reachability in timed automata: A game-based approach. ICALP, 2012.

Constraints may not be satisfied after the perturbation: that is,

  • nly v + d should satisfy g

Example

x=y=1 y:=0

30/38
slide-141
SLIDE 141 Robust guided model-checking

The excess game semantics

[BMS12] Bouyer, Markey, Sankur. Robust reachability in timed automata: A game-based approach. ICALP, 2012.

Constraints may not be satisfied after the perturbation: that is,

  • nly v + d should satisfy g

Example

x=y=1 y:=0

30/38
slide-142
SLIDE 142 Robust guided model-checking

The excess game semantics

[BMS12] Bouyer, Markey, Sankur. Robust reachability in timed automata: A game-based approach. ICALP, 2012.

Constraints may not be satisfied after the perturbation: that is,

  • nly v + d should satisfy g

Example

x=y=1 y:=0

30/38
slide-143
SLIDE 143 Robust guided model-checking

The excess game semantics

[BMS12] Bouyer, Markey, Sankur. Robust reachability in timed automata: A game-based approach. ICALP, 2012.

Constraints may not be satisfied after the perturbation: that is,

  • nly v + d should satisfy g

Example

x=y=1 y:=0

Allows simple design of constraints, ensures divergence of time, avoids convergence phenomena

30/38
slide-144
SLIDE 144 Robust guided model-checking

The excess game semantics – Algorithmics

The (parameterized) synthesis problem

Synthesize δ > 0 and a δ-robust strategy that achieves a given goal.

31/38
slide-145
SLIDE 145 Robust guided model-checking

The excess game semantics – Algorithmics

The (parameterized) synthesis problem

Synthesize δ > 0 and a δ-robust strategy that achieves a given goal.

Two challenges

1

Accumulation of perturbations:

x≤2 y:=0 x=2 1≤x−y

x y x y

31/38
slide-146
SLIDE 146 Robust guided model-checking

The excess game semantics – Algorithmics

The (parameterized) synthesis problem

Synthesize δ > 0 and a δ-robust strategy that achieves a given goal.

Two challenges

1

Accumulation of perturbations:

x≤2 y:=0 x=2 1≤x−y 2δ

x y

δ

x y

31/38
slide-147
SLIDE 147 Robust guided model-checking

The excess game semantics – Algorithmics

The (parameterized) synthesis problem

Synthesize δ > 0 and a δ-robust strategy that achieves a given goal.

Two challenges

1

Accumulation of perturbations:

x≤2 y:=0 x=2 1≤x−y 2δ

x y

δ

x y

2

New regions become reachable

x=y=1 y:=0

31/38
slide-148
SLIDE 148 Robust guided model-checking

The excess game semantics – Algorithmics

The (parameterized) synthesis problem

Synthesize δ > 0 and a δ-robust strategy that achieves a given goal.

Theorem

The parameterized synthesis problem for reachability properties is decidable and EXPTIME-complete. Furthermore, uniform winning strategies (w.r.t. δ) can be computed. Technical tool: a region-based refined game abstraction

  • Extends to two-player games (i.e. to real control problems)
  • Only valid for reachability properties
31/38
slide-149
SLIDE 149 Robust guided model-checking

Outline

  • 1. Introduction
  • 2. Robust “black-box” model-checking

Parameterized enlarged semantics Parameterized shrunk semantics

  • 3. Robust guided model-checking

Excess semantics Conservative semantics

  • 4. Conclusion
32/38
slide-150
SLIDE 150 Robust guided model-checking

The conservative game semantics

[SBMR13] Sankur, Bouyer, Markey, Reynier. Robust Controller Synthesis in Timed Automata. Under submission.

Constraints have to be satisfied after the perturbation: that is, v + d + ǫ should satisfy g for every ǫ ∈ [−δ; +δ]

33/38
slide-151
SLIDE 151 Robust guided model-checking

The conservative game semantics

[SBMR13] Sankur, Bouyer, Markey, Reynier. Robust Controller Synthesis in Timed Automata. Under submission.

Constraints have to be satisfied after the perturbation: that is, v + d + ǫ should satisfy g for every ǫ ∈ [−δ; +δ]

Example

1<x<2 y:=0

33/38
slide-152
SLIDE 152 Robust guided model-checking

The conservative game semantics

[SBMR13] Sankur, Bouyer, Markey, Reynier. Robust Controller Synthesis in Timed Automata. Under submission.

Constraints have to be satisfied after the perturbation: that is, v + d + ǫ should satisfy g for every ǫ ∈ [−δ; +δ]

Example

1<x<2 y:=0

Strongly ensures timing constraints, ensures divergence of time, prevents converging phenomena

33/38
slide-153
SLIDE 153 Robust guided model-checking

The conservative game semantics

[SBMR13] Sankur, Bouyer, Markey, Reynier. Robust Controller Synthesis in Timed Automata. Under submission.

Constraints have to be satisfied after the perturbation: that is, v + d + ǫ should satisfy g for every ǫ ∈ [−δ; +δ]

Example

1<x<2 y:=0

Strongly ensures timing constraints, ensures divergence of time, prevents converging phenomena

33/38
slide-154
SLIDE 154 Robust guided model-checking

The conservative game semantics

[SBMR13] Sankur, Bouyer, Markey, Reynier. Robust Controller Synthesis in Timed Automata. Under submission.

Constraints have to be satisfied after the perturbation: that is, v + d + ǫ should satisfy g for every ǫ ∈ [−δ; +δ]

Example

1<x<2 y:=0

Strongly ensures timing constraints, ensures divergence of time, prevents converging phenomena

33/38
slide-155
SLIDE 155 Robust guided model-checking

The conservative game semantics – Algorithmics

The (parameterized) synthesis problem

Synthesize δ > 0 and a δ-robust strategy that achieves a given goal.

34/38
slide-156
SLIDE 156 Robust guided model-checking

The conservative game semantics – Algorithmics

The (parameterized) synthesis problem

Synthesize δ > 0 and a δ-robust strategy that achieves a given goal.

Theorem

The synthesis problem for B¨ uchi properties is decidable and PSPACE-complete. Furthermore, δ is at most doubly-exponential, and uniform winning strategies (w.r.t. δ) can be computed.

34/38
slide-157
SLIDE 157 Robust guided model-checking

The problem consists in finding cycles that do not become blocked.

35/38
slide-158
SLIDE 158 Robust guided model-checking

The problem consists in finding cycles that do not become blocked. A converging phenomena: ×

35/38
slide-159
SLIDE 159 Robust guided model-checking [AB11] Asarin, Basset. Thin and Thick Timed Regular Languages. FORMATS, 2011.

The problem consists in finding cycles that do not become blocked. A converging phenomena: × No convergence: No such constraining half-spaces.

35/38
slide-160
SLIDE 160 Robust guided model-checking [AB11] Asarin, Basset. Thin and Thick Timed Regular Languages. FORMATS, 2011.

The problem consists in finding cycles that do not become blocked. A converging phenomena: × No convergence: No such constraining half-spaces.

Tools for solving the synthesis problem

Orbit graphs, forgetful cycles [AB11] Forgetful (that is, strongly connected) orbit graph ⇔ no convergence phenomena strong relation with thick automata.

35/38
slide-161
SLIDE 161 Robust guided model-checking

Example

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2

36/38
slide-162
SLIDE 162 Robust guided model-checking

Example

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2

A region cycle:

y x 1 1 2 2 y x 1 1 2 2

delay

y x 1 1 2 2 y x 1 1 2 2

delay

y x 1 1 2 2 36/38
slide-163
SLIDE 163 Robust guided model-checking

Example

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2

A region cycle:

y x 1 1 2 2 y x 1 1 2 2

delay

y x 1 1 2 2 y x 1 1 2 2

delay

y x 1 1 2 2

The corresponding (folded) orbit graph:

36/38
slide-164
SLIDE 164 Robust guided model-checking

Example

x=1 y:=0 x≤2, x:=0 y≥2, y:=0 x=0 ∧ y≥2

The cycle is not forgetful (that is, not strongly connected), Perturbator can enforce convergence:

≥ ǫ

36/38
slide-165
SLIDE 165 Conclusion

Outline

  • 1. Introduction
  • 2. Robust “black-box” model-checking

Parameterized enlarged semantics Parameterized shrunk semantics

  • 3. Robust guided model-checking

Excess semantics Conservative semantics

  • 4. Conclusion
37/38
slide-166
SLIDE 166 Conclusion

Conclusion

Timed automata: a nice mathematical model for real-time systems with interesting decidability properties and algorithmics solutions. Not always easy to transfer correctness proven in this model to real behaviours of the system. We have shown several frameworks for robustness that can be used to ensure correctness in the real-world..

38/38
slide-167
SLIDE 167 Conclusion

Conclusion

Timed automata: a nice mathematical model for real-time systems with interesting decidability properties and algorithmics solutions. Not always easy to transfer correctness proven in this model to real behaviours of the system. We have shown several frameworks for robustness that can be used to ensure correctness in the real-world.. Extension of these works to richer models seems unfortunately hard [BMS13] A quantitative approach to robustness: Perturbator plays randomly Symbolic algorithms?

38/38
slide-168
SLIDE 168 Conclusion

Conclusion

Timed automata: a nice mathematical model for real-time systems with interesting decidability properties and algorithmics solutions. Not always easy to transfer correctness proven in this model to real behaviours of the system. We have shown several frameworks for robustness that can be used to ensure correctness in the real-world.. Extension of these works to richer models seems unfortunately hard [BMS13] A quantitative approach to robustness: Perturbator plays randomly Symbolic algorithms? This list of possible approaches is not exhaustive:

tube acceptance [GHJ97] turn any automaton into a robust one [BLM+11] sampling approach [KP05,BLM+11] probabilistic approach [BBB+08,BBJM12] . . .

38/38