Falsification of hybrid systems with symbolic reachability analysis and trajectory splicing

Sergiy Bogomolov, Goran Frehse, Amit Gurung*, Dongxu Li, Georg Martius, Rajarshi Ray

*Corresponding author for this work

    Research output: Contribution to journalArticlepeer-review

    Abstract

    The falsification of a hybrid system aims at finding trajectories that violate a given safety property. This is a challenging problem, and the practical applicability of current falsification algorithms still suffers from their high time complexity. In contrast to falsification, verification algorithms aim at providing guarantees that no such trajectories exist. Recent symbolic reachability techniques are capable of efficiently computing linear constraints that enclose all trajectories of the system with reasonable precision. In this paper, we leverage the power of symbolic reachability algorithms to improve the scalability of falsification techniques. Recent approaches to falsification reduce the problem to a nonlinear optimization problem. We propose to reduce the search space of the optimization problem by adding linear state constraints obtained with a reachability algorithm. An empirical study of how varying abstractions during symbolic reachability analysis affect the performance of solving a falsification problem is presented. In addition, for solving a falsification problem, we propose an alternating minimization algorithm that solves a linear programming problem and a non-linear programming problem in alternation finitely many times. We showcase the efficacy of our algorithms on a number of standard hybrid systems benchmarks demonstrating the performance increase and number of falsifyable instances.

    Original languageEnglish
    Article number101093
    JournalNonlinear Analysis: Hybrid Systems
    Volume42
    DOIs
    Publication statusPublished - Nov 2021

    Fingerprint

    Dive into the research topics of 'Falsification of hybrid systems with symbolic reachability analysis and trajectory splicing'. Together they form a unique fingerprint.

    Cite this