Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3302504.3311811acmconferencesArticle/Chapter ViewAbstractPublication PagescpsweekConference Proceedingsconference-collections
research-article

Formal verification of weakly-hard systems

Published: 16 April 2019 Publication History

Abstract

Weakly-hard systems are real-time systems that can tolerate occasional deadline misses in a bounded manner. Compared with traditional systems with hard deadline constraints, they provide more scheduling flexibility, and thus expand the design space for system configuration and reconfiguration. A key question for such a system is precisely to what degree it can tolerate deadline misses while still meeting its functional requirements. In this paper, we provide a formal treatment to the verification problem of a general class of weakly-hard systems. We discuss relaxation and over-approximation techniques for managing the complexity of reachability analysis, and develop algorithms based upon these for verifying the safety of weakly-hard systems. Experiments demonstrate the effectiveness of our approach in understanding the impact of and guiding the selection among different weakly-hard constraints.

References

[1]
A. Abate, M. Prandini, J. Lygeros, and S. Sastry. 2008. Probabilistic reachability and safety for controlled discrete time stochastic hybrid systems. Automatica 44, 11 (2008), 2724--2734.
[2]
L. Ahrendts, S. Quinton, T. Boroske, and R. Ernst. 2018. Verifying Weakly-Hard Real-Time Properties of Traffic Streams in Switched Networks. In ECRTS, Vol. 106. 15:1--15:22.
[3]
E. Alur, C. Courcoubetis, T. A. Henzinger, and P. Ho. 1993. Hybrid automata: An algorithmic approach to the specification and verification of hybrid systems. In Hybrid systems. Springer, 209--229.
[4]
A. Colin K. Maeng B. Lucia, V. Balaji and E. Ruppel. 2017. Intermittent Computing: Challenges and Opportunities. In Summit on Advances in Programming Languages. 8:1--8:14.
[5]
D. Balsamo, A. S. Weddell, A. Das, A. R. Arreola, D. Brunelli, B. M. Al-Hashimi, G. V. Merrett, and L. Benini. 2016. Hibernus: A Self-Calibrating and Adaptive System for Transiently-Powered Embedded Devices. TCAD 35, 12 (2016), 1968--1980.
[6]
G. Bernat, A. Burns, and A. Liamosi. 2001. Weakly hard real-time systems. IEEE transactions on Computers 50, 4 (2001), 308--321.
[7]
G. Bernat and R. Cayssials. 2001. Guaranteed on-line weakly-hard real-time systems. In RTSS. 22--35.
[8]
T. Bund and F. Slomka. 2014. Controller/platform co-design of networked control systems based on density functions. In ACM SIGBED International Workshop on Design, Modeling, and Evaluation of Cyber-Physical Systems. ACM, 11--14.
[9]
A. Cervin, D. Henriksson, B. Lincoln, J. Eker, and K.-E. Arzen. 2003. How does control timing affect performance? Analysis and simulation of timing using Jitterbug and TrueTime. IEEE Control Systems Magazine 23, 3 (June 2003), 16--30.
[10]
S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno. 2011. Comprehensive Experimental Analyses of Automotive Attack Surfaces. In USENIX Security.
[11]
T. Chen and B. A. Francis. 2012. Optimal sampled-data control systems. Springer Science & Business Media.
[12]
H. Choi, H. Kim, and Q. Zhu. 2019. Job-Class-Level Fixed Priority Scheduling of Weakly-Hard Real-Time Systems. In IEEE Real-Time Technology and Applications Symposium (RTAS).
[13]
H. S. Chwa, K. G. Shin, and J. Lee. 2018. Closing the Gap between Stability and Schedulability: A New Task Model for Cyber-Physical Systems. In IEEE Real-Time Technology and Applications Symposium (RTAS).
[14]
A. Colin and B. Lucia. 2016. Chain: Tasks and Channels for Reliable Intermittent Programs. SIGPLAN Not. 51, 10 (Oct. 2016), 514--530.
[15]
P. S. Duggirala and M. Viswanathan. 2015. Analyzing real time linear control systems using software verification. In RTSS. IEEE, 216--226.
[16]
G. Frehse, A. Hamann, S. Quinton, and M. Woehrle. 2014. Formal Analysis of Timing Effects on Closed-Loop Properties of Control Software. In RTSS. 53--62.
[17]
M. B. Gaid, D. Simon, and O. Sename. 2008. A Design Methodology for Weakly-Hard Real-Time Control. IFAC 41, 2 (2008), 10258 -- 10264.
[18]
M. Hamdaoui and P. Ramanathan. 1995. A dynamic priority assignment technique for streams with (m, k)-firm deadlines. IEEE Trans. Comput. 44, 12 (1995), 1443--1451.
[19]
Z. A. H. Hammadeh, R. Ernst, S. Quinton, R. Henia, and L. Rioux. 2017. Bounding deadline misses in weakly-hard real-time systems with task dependencies. In DATE. 584--589.
[20]
D. Henrion and M. Korda. 2014. Convex computation of the region of attraction of polynomial control systems. IEEE Trans. Automat. Control 59, 2 (2014), 297--312.
[21]
C. Huang, X. Chen, W. Lin, Z. Yang, and X. Li. 2017. Probabilistic Safety Verification of Stochastic Hybrid Systems Using Barrier Certificates. TECS 16, 5s (2017), 186.
[22]
C. Huang, K. Wardega, W. Li, and Q. Zhu. 2019. Exploring Weakly-hard Paradigm for Networked Systems. In Workshop on Design Automation for CPS and IoT (DESTION'19).
[23]
M. Korda, D. Henrion, and C. N. Jones. 2013. Inner approximations of the region of attraction for polynomial dynamical systems. IFAC 46, 23 (2013), 534--539.
[24]
T. H. Lee and J. H. Park. 2017. Stability Analysis of Sampled-Data Systems via Free-Matrix-Based Time-Dependent Discontinuous Lyapunov Approach. IEEE Trans. Automat. Control 62, 7 (2017), 3653--3657.
[25]
Tae H. Lee, Ju H. Park, S. M. Lee, and O. M. Kwon. 2014. Robust sampled-data control with random missing data scenario. Internat. J. Control 87, 9 (2014), 1957--1969.
[26]
J. Li, Y. Song, and F. Simonot-Lion. 2006. Providing Real-Time Applications With Graceful Degradation of QoS and Fault Tolerance According to (m, k)-Firm Model. IEEE Transactions on Industrial Informatics 2, 2 (2006), 112--119.
[27]
W. Li, L. Gérard, and N. Shankar. 2015. Design and verification of multi-rate distributed systems. In MEMOCODE. 20--29.
[28]
C. Lin, B. Zheng, Q. Zhu, and A. Sangiovanni-Vincentelli. 2015. Security-Aware Design Methodology and Optimization for Automotive Systems. ACM Transactions on Design Automation of Electronic Systems 21, 1, Article 18 (December 2015), 26 pages.
[29]
J. Löfberg. 2004. YALMIP : A Toolbox for Modeling and Optimization in MATLAB. In CACSD. Taipei, Taiwan.
[30]
R. Majumdar, I. Saha, and M. Zamani. 2011. Performance-aware scheduler synthesis for control systems. In EmSoft. ACM, 299--308.
[31]
P.Marti, A. Camacho, M. Velasco, and M. E. M. Ben Gaid. 2010. Runtime Allocation of Optional Control Jobs to a Set of CAN-Based Networked Control Systems. IEEE Transactions on Industrial Informatics 6, 4 (2010), 503--520.
[32]
D. Nešić, A. R. Teel, and P. V. Kokotović. 1999. Sufficient conditions for stabilization of sampled-data nonlinear systems via discrete-time approximations. Systems & Control Letters 38, 4--5 (1999), 259--270.
[33]
H. Omran, L. Hetel, M. Petreczky, J. Richard, and F. Lamnabhi-Lagarrigue. 2016. Stability analysis of some classes of input-affine nonlinear systems with aperiodic sampled-data control. Automatica 70 (2016), 266--274.
[34]
P. Pazzaglia, L. Pannocchi, A. Biondi, and M. D. Natale. 2018. Beyond the Weakly Hard Model: Measuring the Performance Cost of Deadline Misses. In ECRTS, Vol. 106. 10:1--10:22.
[35]
S. Prajna and A. Jadbabaie. 2004. Safety verification of hybrid systems using barrier certificates. In HSCC. Springer, 477--492.
[36]
S. Quinton and R. Ernst. 2012. Generalized weakly-hard constraints. In ISoLA. Springer, 96--110.
[37]
P. Ramanathan. 1999. Overload management in real-time control applications using (m, k)-firm guarantee. IEEE Transactions on Parallel and Distributed Systems 10, 6 (1999), 549--559.
[38]
W. Ruan, X. Huang, and MZ. Kwiatkowska. 2018. Reachability analysis of deep neural networks with provable guarantees. IJCAI.
[39]
A. Seuret. 2010. Exponential stability and stabilization of sampled-data systems with time-varying period. In IFAC Workshop on Time Delay Systems.
[40]
A. Seuret and M. M. Peet. 2013. Stability analysis of sampled-data systems using sum of squares. IEEE Trans. Automat. Control 58, 6 (2013), 1620--1625.
[41]
F. Shmarov and P. Zuliani. 2015. Probreach: verified probabilistic delta-reachability for stochastic hybrid systems. In HSCC. ACM, 134--139.
[42]
D. Soudbakhsh, L. TX. Phan, A.M. Annaswamy, and O. Sokolsky. 2016. Co-design of arbitrated network control systems with overrun strategies. IEEE Transactions on Control of Network Systems (2016).
[43]
Y. Sun and M. D. Natale. 2017. Weakly Hard Schedulability Analysis for Fixed Priority Scheduling of Periodic Real-Time Tasks. TECS 16, 5s (2017).
[44]
V. Talla, B. Kellogg, B. Ransford, S. Naderiparizi, S. Gollakota, and J. R. Smith. 2015. Powering the Next Billion Devices with Wi-fi. In CoNEXT. ACM, 4:1--4:13.
[45]
U. Topcu, A. K. Packard, P. Seiler, and G. J. Balas. 2010. Robust region-of-attraction estimation. IEEE Trans. Automat. Control 55, 1 (2010), 137--142.
[46]
G. Valmorbida and J. Anderson. 2014. Region of attraction analysis via invariant sets. In ACC. IEEE, 3591--3596.
[47]
Gera Weiss and Rajeev Alur. 2007. Automata based interfaces for control and scheduling. In HSCC. Springer, 601--613.
[48]
W. Xu, Z. A. H. Hammadeh, A. Kröller, R. Ernst, and S. Quinton. 2015. Improved Deadline Miss Models for Real-Time Systems Using Typical Worst-Case Analysis. In ECRTS. 247--256.
[49]
Z. Yang, C. Huang, X. Chen, W. Lin, and Z. Liu. 2016. A linear programming relaxation based approach for generating barrier certificates of hybrid systems. In FM. Springer, 721--738.
[50]
W. Zhang and L. Yu. 2010. Stabilization of Sampled-Data Control Systems With Control Inputs Missing. IEEE Trans. Automat. Control 55, 2 (2010), 447--452.
[51]
H. Zhao, N. Zhan, D. Kapur, and K. G. Larsen. 2012. A hybrid approach for synthesizing optimal controllers of hybrid systems: A case study of the oil pump industrial example. In FM. Springer, 471--485.
[52]
B. Zheng, W. Li, P. Deng, L. Gerard, Q. Zhu, and N. Shankar. 2015. Design and Verification for Transportation System Security. In DAC.

Cited By

View all
  • (2023)System Verification and Runtime Monitoring with Multiple Weakly-Hard ConstraintsACM Transactions on Cyber-Physical Systems10.1145/36033807:3(1-28)Online publication date: 13-Jul-2023
  • (2023)Safety-Aware Flexible Schedule Synthesis for Cyber-Physical Systems Using Weakly-Hard ConstraintsProceedings of the 28th Asia and South Pacific Design Automation Conference10.1145/3566097.3567848(46-51)Online publication date: 31-Jan-2023
  • (2023)Formal Certification Methods for Automated Vehicle Safety AssessmentIEEE Transactions on Intelligent Vehicles10.1109/TIV.2022.31705178:1(232-249)Online publication date: Jan-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
HSCC '19: Proceedings of the 22nd ACM International Conference on Hybrid Systems: Computation and Control
April 2019
299 pages
ISBN:9781450362825
DOI:10.1145/3302504
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 April 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. formal verification
  2. safety
  3. weakly-hard

Qualifiers

  • Research-article

Funding Sources

  • National Science Foundation awards
  • NSF grant
  • DARPA BRASS program

Conference

HSCC '19
Sponsor:

Acceptance Rates

Overall Acceptance Rate 153 of 373 submissions, 41%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)35
  • Downloads (Last 6 weeks)1
Reflects downloads up to 16 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2023)System Verification and Runtime Monitoring with Multiple Weakly-Hard ConstraintsACM Transactions on Cyber-Physical Systems10.1145/36033807:3(1-28)Online publication date: 13-Jul-2023
  • (2023)Safety-Aware Flexible Schedule Synthesis for Cyber-Physical Systems Using Weakly-Hard ConstraintsProceedings of the 28th Asia and South Pacific Design Automation Conference10.1145/3566097.3567848(46-51)Online publication date: 31-Jan-2023
  • (2023)Formal Certification Methods for Automated Vehicle Safety AssessmentIEEE Transactions on Intelligent Vehicles10.1109/TIV.2022.31705178:1(232-249)Online publication date: Jan-2023
  • (2023)Safety-Aware Implementation of Control Tasks via Scheduling with Period Boosting and Compressing2023 IEEE 29th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA)10.1109/RTCSA58653.2023.00031(196-205)Online publication date: 30-Aug-2023
  • (2023)Verification and Design of Robust and Safe Neural Network-enabled Autonomous Systems2023 59th Annual Allerton Conference on Communication, Control, and Computing (Allerton)10.1109/Allerton58177.2023.10313451(1-8)Online publication date: 26-Sep-2023
  • (2023)Statistical Approach to Efficient and Deterministic Schedule Synthesis for Cyber-Physical SystemsAutomated Technology for Verification and Analysis10.1007/978-3-031-45329-8_15(312-333)Online publication date: 22-Oct-2023
  • (2022)Control Performance Analysis of Automotive Cyber-physical Systems: A Study on Efficient Formal VerificationACM Transactions on Cyber-Physical Systems10.1145/35760468:2(1-19)Online publication date: 14-Dec-2022
  • (2022)Characterizing the Effect of Deadline Misses on Time-Triggered Task ChainsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2022.319914641:11(3957-3968)Online publication date: Nov-2022
  • (2022)WeaklyHard.jl: Scalable Analysis of Weakly-Hard Constraints2022 IEEE 28th Real-Time and Embedded Technology and Applications Symposium (RTAS)10.1109/RTAS54340.2022.00026(228-240)Online publication date: May-2022
  • (2022)Stability of Linear Systems Under Extended Weakly-Hard ConstraintsIEEE Control Systems Letters10.1109/LCSYS.2022.31799606(2900-2905)Online publication date: 2022
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media