SlideShare une entreprise Scribd logo
1  sur  34
Télécharger pour lire hors ligne
Analytic Dependency Loops in
Architectural Models of
Cyber-Physical Systems
8th International Workshop on Model-based Architecting of
Cyber-Physical and Embedded Systems (ACES-MB)
September 28, 2015
Ottawa, Canada
Ivan Ruchkin
Bradley Schmerl
David Garlan
2
Acknowledgments
● Collaborators:
— Dionisio De Niz (SEI CMU)
— Sagar Chaki (SEI CMU)
— Ashwini Rao (ISR CMU)
● Sponsors:
— NSF
— DoD
— NSA
3
Agenda
● Dependency loops in cyber-physical systems
● Related work and background
● Fixpoints and cases of loops
● Resolution techniques
● Wrap-up
4
Agenda
● Dependency loops in cyber-physical systems
● Related work and background
● Fixpoints and cases of loops
● Resolution techniques
● Wrap-up
5
Driverless Cars
Image credit: telegraph.co.uk
6
Braking Subsystem Architecture
7
Analyses
8
Analyses
9
Analyses
10
Analyses
11
Analytic Dependencies
12
Dependency Loop Example
13
Dependency Loop
14
Analytic Dependency Loops
● Appear in complex cyber-physical systems
● Important to address
— Currently require expensive manual effort
— May introduce subtle errors into designs
● No up-front, one-size-fits-all solution
— Diverse disciplines and combinations of analyses
— Different project scope and constraints
● Goal: develop concepts and methods for resolving
such loops
15
Agenda
● Dependency loops in cyber-physical systems
● Related work and background
● Fixpoints and cases of loops
● Resolution techniques
● Wrap-up
16
Related Work
● Loops and dependencies in other contexts
— Loop invariants in programming languages [1]
— Deadlocks in dataflow systems [2]
— Dependencies in design [3]
● Model evolution
— Model transformations [4]
— Analysis contracts[5]
[1] P. Cousot and R. Cousot. Automatic synthesis of optimal invariant assertions, SIGART Bulletin 1977.
[2] Y. Zhou and E. Lee. A Causality Interface for Deadlock Analysis in Dataflow, EMSOFT 2006.
[3] A. Qamar. Model and Dependency Management in Mechatronic Design, PhD Thesis, 2013.
[4] G. Bergmann, I. Rth, G. Varr, D. Varr. Change-driven model transformations, SoSyM 2011.
[5] I. Ruchkin, D. De Niz, S. Chaki, D. Garlan. Contract-based Integration of Cyber-physical Analyses, EMSOFT 2014.
17
Background
● Analysis contract C is a tuple (I, O, A, G):
— Inputs I
— Outputs O
— Assumptions A
— Guarantees G
● Analysis A1 depends on analysis A2 iff:
A1.I   A∩ 2.O ≠ ∅
18
Agenda
● Dependency loops in cyber-physical systems
● Related work and background
● Fixpoints and cases of loops
● Resolution techniques
● Wrap-up
19
Fixpoints
● System model M is a fixpoint (FP)
— For analysis A if: A(M) = M
— For dependency loop A1..AN if: ∀i:1..N · Ai(M) = M
— “A solution to a loop”
● System model M is a candidate fixpoint (CFP)
— For analysis A: M ⊨ A.G
— For dependency loop A1..AN if: ∀i:1..N ∙ M ⊨ Ai.G
— “Almost a solution to a loop”
20
Cases of Dependency Loops
C1. Strong convergence
— FP exists, and is reachable by any sequence of analyses
C2. Weak convergence
— FP exists, and is reachable by some sequence of analyses
C3. Weak divergence
— FP exists, but is not reachable by any sequence of analyses
C4. Divergence
— FP does not exist, but CFP exists
C5. Strong divergence
— Neither FP, nor CFP exist
21
Example: Strong & Weak Convergence
22
Example: Weak Divergence & Divergence
23
Agenda
● Dependency loops in cyber-physical systems
● Related work and background
● Fixpoints and cases of loops
● Resolution techniques
● Wrap-up
24
Approach
1. Use rich multi-view model
2. Find a fixpoint (or candidate)
3. Verify that a model is a fixpoint
25
Multi-View Architecture
26
Technique 1: Iterative Execution
● Execute analyses in some sequence
— Random
— Contract-guided
— Model order-guided
● Applicability: strong and weak convergence
● Pros:
— Simple, accessible
— Can verify fixpoints
● Cons:
— Computationally expensive
— Heuristic, no guarantees
27
Technique 2: Constraint Solving
● Generate a constraint satisfaction problem
— Using architectural model and guarantees
— Does not execute analyses
● Applicability:
— Finds CFP in all cases except strong divergence
— Demonstrates absence of CFP in strong divergence
● Pros:
— Exhaustive search within bounds
● Cons:
— Results need to be verified with a different method
— Relies on model translation to a constraint language
28
Technique 3: Genetic Search
● Derive hybrids of models
— Crossover: M1 x M2 = M1   M⊕ 2   {∪ m Ɐ ⊆ M1   M∩ 2}
– E.g., AAB x ABB = {AB, AAB, ABB, AABB}
● Applicable:
— Find FP in convergence and weak divergence
— Find CFP in divergence
● Pros:
— Can find FPs/CFPs beyond constraint solving bounds
● Cons:
— Heuristic, no guarantees
29
Summary of Resolution Techniques
Case Iterative Execution Constraint Solving Genetic Search
Find FP in
strong conv.
✓ ✓ ✓
Verify FP in
strong conv.
✓
Find FP in
weak conv.
✓ ✓
Verify FP in
weak conv.
✓
Find FP in
weak div.
✓ ✓
Verify FP in
weak div.
✓
Find CFP in div. ✓ ✓
Verify CFP in div. ✓ ✓
Detect absence
of CFP in str. div.
✓
30
Agenda
● Dependency loops in cyber-physical systems
● Related work and background
● Fixpoints and cases of loops
● Resolution techniques
● Wrap-up
31
Future Work
● Other techniques for loop resolution
● Connect analysis contracts to system invariants
— Discharge assumptions with invariants
— Discharge invariants with guarantees
● Experiments on realistic system models
32
Summary
● Analytic dependency loops occur in complex systems
— Contract specifications are insufficient to resolve
● This paper explored resolution techniques:
— Iterative execution
— Constraint solving
— Genetic search
33
References
● Analysis contracts methodology:
— I. Ruchkin, D. De Niz, S. Chaki, D. Garlan. Contract-based
Integration of Cyber-physical Analyses, EMSOFT 2014.
● ACTIVE tool for verifying contracts:
— I. Ruchkin, D. De Niz, S. Chaki, D. Garlan. ACTIVE: A Tool
for Integrating Analysis Contracts, AVICPS 2014.
● Security and reliability analyses:
— I. Ruchkin, A. Rao, D. De Niz, S. Chaki, D. Garlan.
Eliminating Inter-Domain Vulnerabilities in Cyber-
Physical Systems: An Analysis Contracts Approach, CPS-
SPC 2015.
34
Q&A
● When to terminate the search?
● What views to use for constraint generation?
● What if no fixpoints/candidates found?
— Involve humans
— Probably irreconcilable requirements
● Resolving vs. avoiding the loop?
● Automated recognition of loop cases?
● General theorems about techniques?

Contenu connexe

Similaire à Analytic Dependency Loops in Architectural Models of Cyber-Physical Systems

Inconsistencies in Models of Adaptive Service Robots
Inconsistencies in Models of Adaptive Service RobotsInconsistencies in Models of Adaptive Service Robots
Inconsistencies in Models of Adaptive Service RobotsIvan Ruchkin
 
Challenges of Cloud Monitoring
Challenges of Cloud MonitoringChallenges of Cloud Monitoring
Challenges of Cloud MonitoringWilliam Pourmajidi
 
Requirement verification & validation
Requirement verification & validationRequirement verification & validation
Requirement verification & validationAbdul Basit
 
2016 03-16 digital energy luncheon
2016 03-16 digital energy luncheon2016 03-16 digital energy luncheon
2016 03-16 digital energy luncheonMark Reynolds
 
Sdn slide _1_
Sdn slide _1_Sdn slide _1_
Sdn slide _1_Shyam M.B
 
Ontologies mining using association rules
Ontologies mining using association rulesOntologies mining using association rules
Ontologies mining using association rulesChemseddine Berbague
 
Thesis Defense: Integration of Modeling Methods for Cyber-Physical Systems
Thesis Defense: Integration of Modeling Methods for Cyber-Physical SystemsThesis Defense: Integration of Modeling Methods for Cyber-Physical Systems
Thesis Defense: Integration of Modeling Methods for Cyber-Physical SystemsIvan Ruchkin
 
Survey on Software Defect Prediction
Survey on Software Defect PredictionSurvey on Software Defect Prediction
Survey on Software Defect PredictionSung Kim
 
Retrosynthesis tutorial v2
Retrosynthesis tutorial v2Retrosynthesis tutorial v2
Retrosynthesis tutorial v2Wonjun Jeong
 
From Model-based to Model and Simulation-based Systems Architectures
From Model-based to Model and Simulation-based Systems ArchitecturesFrom Model-based to Model and Simulation-based Systems Architectures
From Model-based to Model and Simulation-based Systems ArchitecturesObeo
 
Autonomous Systems: How to Address the Dilemma between Autonomy and Safety
Autonomous Systems: How to Address the Dilemma between Autonomy and SafetyAutonomous Systems: How to Address the Dilemma between Autonomy and Safety
Autonomous Systems: How to Address the Dilemma between Autonomy and SafetyLionel Briand
 
Self-adaptation Driven by goals in SysML Models
Self-adaptation Driven by goals in SysML ModelsSelf-adaptation Driven by goals in SysML Models
Self-adaptation Driven by goals in SysML Modelsamalanda1
 
Survey on Software Defect Prediction
Survey on Software Defect PredictionSurvey on Software Defect Prediction
Survey on Software Defect Predictionlifove
 
Software Engineering Research: Leading a Double-Agent Life.
Software Engineering Research: Leading a Double-Agent Life.Software Engineering Research: Leading a Double-Agent Life.
Software Engineering Research: Leading a Double-Agent Life.Lionel Briand
 
NWC 2015 - Critical - Path Simulation
NWC 2015 - Critical - Path Simulation NWC 2015 - Critical - Path Simulation
NWC 2015 - Critical - Path Simulation Jennifer Day
 
Survey on Software Defect Prediction (PhD Qualifying Examination Presentation)
Survey on Software Defect Prediction (PhD Qualifying Examination Presentation)Survey on Software Defect Prediction (PhD Qualifying Examination Presentation)
Survey on Software Defect Prediction (PhD Qualifying Examination Presentation)lifove
 
Modeling&Simulation_Ch01_part 3.pptx
Modeling&Simulation_Ch01_part 3.pptxModeling&Simulation_Ch01_part 3.pptx
Modeling&Simulation_Ch01_part 3.pptxMaiGaafar
 
Operations Research Digital Material.pdf
Operations Research Digital Material.pdfOperations Research Digital Material.pdf
Operations Research Digital Material.pdfTANVEERSINGHSOLANKI
 

Similaire à Analytic Dependency Loops in Architectural Models of Cyber-Physical Systems (20)

Inconsistencies in Models of Adaptive Service Robots
Inconsistencies in Models of Adaptive Service RobotsInconsistencies in Models of Adaptive Service Robots
Inconsistencies in Models of Adaptive Service Robots
 
Challenges of Cloud Monitoring
Challenges of Cloud MonitoringChallenges of Cloud Monitoring
Challenges of Cloud Monitoring
 
Requirement verification & validation
Requirement verification & validationRequirement verification & validation
Requirement verification & validation
 
2016 03-16 digital energy luncheon
2016 03-16 digital energy luncheon2016 03-16 digital energy luncheon
2016 03-16 digital energy luncheon
 
Sdn slide _1_
Sdn slide _1_Sdn slide _1_
Sdn slide _1_
 
Ontologies mining using association rules
Ontologies mining using association rulesOntologies mining using association rules
Ontologies mining using association rules
 
Thesis Defense: Integration of Modeling Methods for Cyber-Physical Systems
Thesis Defense: Integration of Modeling Methods for Cyber-Physical SystemsThesis Defense: Integration of Modeling Methods for Cyber-Physical Systems
Thesis Defense: Integration of Modeling Methods for Cyber-Physical Systems
 
Survey on Software Defect Prediction
Survey on Software Defect PredictionSurvey on Software Defect Prediction
Survey on Software Defect Prediction
 
Retrosynthesis tutorial v2
Retrosynthesis tutorial v2Retrosynthesis tutorial v2
Retrosynthesis tutorial v2
 
From Model-based to Model and Simulation-based Systems Architectures
From Model-based to Model and Simulation-based Systems ArchitecturesFrom Model-based to Model and Simulation-based Systems Architectures
From Model-based to Model and Simulation-based Systems Architectures
 
Autonomous Systems: How to Address the Dilemma between Autonomy and Safety
Autonomous Systems: How to Address the Dilemma between Autonomy and SafetyAutonomous Systems: How to Address the Dilemma between Autonomy and Safety
Autonomous Systems: How to Address the Dilemma between Autonomy and Safety
 
Self-adaptation Driven by goals in SysML Models
Self-adaptation Driven by goals in SysML ModelsSelf-adaptation Driven by goals in SysML Models
Self-adaptation Driven by goals in SysML Models
 
Survey on Software Defect Prediction
Survey on Software Defect PredictionSurvey on Software Defect Prediction
Survey on Software Defect Prediction
 
Paderborn
PaderbornPaderborn
Paderborn
 
Software Engineering Research: Leading a Double-Agent Life.
Software Engineering Research: Leading a Double-Agent Life.Software Engineering Research: Leading a Double-Agent Life.
Software Engineering Research: Leading a Double-Agent Life.
 
NWC 2015 - Critical - Path Simulation
NWC 2015 - Critical - Path Simulation NWC 2015 - Critical - Path Simulation
NWC 2015 - Critical - Path Simulation
 
2019 GDRR: Blockchain Data Analytics - QuTrack: Model Life Cycle Management f...
2019 GDRR: Blockchain Data Analytics - QuTrack: Model Life Cycle Management f...2019 GDRR: Blockchain Data Analytics - QuTrack: Model Life Cycle Management f...
2019 GDRR: Blockchain Data Analytics - QuTrack: Model Life Cycle Management f...
 
Survey on Software Defect Prediction (PhD Qualifying Examination Presentation)
Survey on Software Defect Prediction (PhD Qualifying Examination Presentation)Survey on Software Defect Prediction (PhD Qualifying Examination Presentation)
Survey on Software Defect Prediction (PhD Qualifying Examination Presentation)
 
Modeling&Simulation_Ch01_part 3.pptx
Modeling&Simulation_Ch01_part 3.pptxModeling&Simulation_Ch01_part 3.pptx
Modeling&Simulation_Ch01_part 3.pptx
 
Operations Research Digital Material.pdf
Operations Research Digital Material.pdfOperations Research Digital Material.pdf
Operations Research Digital Material.pdf
 

Plus de Ivan Ruchkin

Poster: Conservative Safety Monitors of Stochastic Dynamical Systems
Poster: Conservative Safety Monitors of Stochastic Dynamical SystemsPoster: Conservative Safety Monitors of Stochastic Dynamical Systems
Poster: Conservative Safety Monitors of Stochastic Dynamical SystemsIvan Ruchkin
 
Poster: How Safe Am I Given What I See? Calibrated Prediction of Safety Chanc...
Poster: How Safe Am I Given What I See? Calibrated Prediction of Safety Chanc...Poster: How Safe Am I Given What I See? Calibrated Prediction of Safety Chanc...
Poster: How Safe Am I Given What I See? Calibrated Prediction of Safety Chanc...Ivan Ruchkin
 
Verify-then-Monitor: Calibration Guarantees for Safety Confidence
Verify-then-Monitor: Calibration Guarantees for Safety ConfidenceVerify-then-Monitor: Calibration Guarantees for Safety Confidence
Verify-then-Monitor: Calibration Guarantees for Safety ConfidenceIvan Ruchkin
 
Causal Repair of Learning-Enabled Cyber-physical Systems
Causal Repair of Learning-Enabled Cyber-physical SystemsCausal Repair of Learning-Enabled Cyber-physical Systems
Causal Repair of Learning-Enabled Cyber-physical SystemsIvan Ruchkin
 
Conservative Safety Monitors of Stochastic Dynamical Systems
Conservative Safety Monitors of Stochastic Dynamical SystemsConservative Safety Monitors of Stochastic Dynamical Systems
Conservative Safety Monitors of Stochastic Dynamical SystemsIvan Ruchkin
 
Confidence Composition for Monitors of Verification Assumptions
Confidence Composition for Monitors of Verification AssumptionsConfidence Composition for Monitors of Verification Assumptions
Confidence Composition for Monitors of Verification AssumptionsIvan Ruchkin
 
Overcoming Heterogeneity in Autonomous Cyber-Physical Systems
Overcoming Heterogeneity in Autonomous Cyber-Physical SystemsOvercoming Heterogeneity in Autonomous Cyber-Physical Systems
Overcoming Heterogeneity in Autonomous Cyber-Physical SystemsIvan Ruchkin
 
High-Confidence Data Programming for Evaluating Suppression of Physiological ...
High-Confidence Data Programming for Evaluating Suppression of Physiological ...High-Confidence Data Programming for Evaluating Suppression of Physiological ...
High-Confidence Data Programming for Evaluating Suppression of Physiological ...Ivan Ruchkin
 
Data Generation with PROSPECT: a Probability Specification Tool
Data Generation with PROSPECT: a Probability Specification ToolData Generation with PROSPECT: a Probability Specification Tool
Data Generation with PROSPECT: a Probability Specification ToolIvan Ruchkin
 
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...Ivan Ruchkin
 
Confidence Composition (CoCo) for Dynamic Assurance of Learning-Enabled Auton...
Confidence Composition (CoCo) for Dynamic Assurance of Learning-Enabled Auton...Confidence Composition (CoCo) for Dynamic Assurance of Learning-Enabled Auton...
Confidence Composition (CoCo) for Dynamic Assurance of Learning-Enabled Auton...Ivan Ruchkin
 
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...Ivan Ruchkin
 
On the Role of Assumptions in Engineering Smart Systems
On the Role of Assumptions in Engineering Smart SystemsOn the Role of Assumptions in Engineering Smart Systems
On the Role of Assumptions in Engineering Smart SystemsIvan Ruchkin
 
Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...
Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...
Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...Ivan Ruchkin
 
Overview of Epidemic Models for COVID-19
Overview of Epidemic Models for COVID-19Overview of Epidemic Models for COVID-19
Overview of Epidemic Models for COVID-19Ivan Ruchkin
 
Towards a Formal Framework for Hybrid Planning in Self-Adaptation
Towards a Formal Framework for Hybrid Planning in Self-AdaptationTowards a Formal Framework for Hybrid Planning in Self-Adaptation
Towards a Formal Framework for Hybrid Planning in Self-AdaptationIvan Ruchkin
 
IPL: An Integration Property Language for Multi-Model Cyber-Physical Systems
IPL: An Integration Property Language for Multi-Model Cyber-Physical SystemsIPL: An Integration Property Language for Multi-Model Cyber-Physical Systems
IPL: An Integration Property Language for Multi-Model Cyber-Physical SystemsIvan Ruchkin
 
Challenges in Physical Modeling for Adaptation of Cyber-Physical Systems
Challenges in Physical Modeling for Adaptation of Cyber-Physical SystemsChallenges in Physical Modeling for Adaptation of Cyber-Physical Systems
Challenges in Physical Modeling for Adaptation of Cyber-Physical SystemsIvan Ruchkin
 
Hardware Power Modeling for Turtlebot
Hardware Power Modeling for TurtlebotHardware Power Modeling for Turtlebot
Hardware Power Modeling for TurtlebotIvan Ruchkin
 
Integration Beyond Components and Models: Research Challenges and Directions
Integration Beyond Components and Models: Research Challenges and DirectionsIntegration Beyond Components and Models: Research Challenges and Directions
Integration Beyond Components and Models: Research Challenges and DirectionsIvan Ruchkin
 

Plus de Ivan Ruchkin (20)

Poster: Conservative Safety Monitors of Stochastic Dynamical Systems
Poster: Conservative Safety Monitors of Stochastic Dynamical SystemsPoster: Conservative Safety Monitors of Stochastic Dynamical Systems
Poster: Conservative Safety Monitors of Stochastic Dynamical Systems
 
Poster: How Safe Am I Given What I See? Calibrated Prediction of Safety Chanc...
Poster: How Safe Am I Given What I See? Calibrated Prediction of Safety Chanc...Poster: How Safe Am I Given What I See? Calibrated Prediction of Safety Chanc...
Poster: How Safe Am I Given What I See? Calibrated Prediction of Safety Chanc...
 
Verify-then-Monitor: Calibration Guarantees for Safety Confidence
Verify-then-Monitor: Calibration Guarantees for Safety ConfidenceVerify-then-Monitor: Calibration Guarantees for Safety Confidence
Verify-then-Monitor: Calibration Guarantees for Safety Confidence
 
Causal Repair of Learning-Enabled Cyber-physical Systems
Causal Repair of Learning-Enabled Cyber-physical SystemsCausal Repair of Learning-Enabled Cyber-physical Systems
Causal Repair of Learning-Enabled Cyber-physical Systems
 
Conservative Safety Monitors of Stochastic Dynamical Systems
Conservative Safety Monitors of Stochastic Dynamical SystemsConservative Safety Monitors of Stochastic Dynamical Systems
Conservative Safety Monitors of Stochastic Dynamical Systems
 
Confidence Composition for Monitors of Verification Assumptions
Confidence Composition for Monitors of Verification AssumptionsConfidence Composition for Monitors of Verification Assumptions
Confidence Composition for Monitors of Verification Assumptions
 
Overcoming Heterogeneity in Autonomous Cyber-Physical Systems
Overcoming Heterogeneity in Autonomous Cyber-Physical SystemsOvercoming Heterogeneity in Autonomous Cyber-Physical Systems
Overcoming Heterogeneity in Autonomous Cyber-Physical Systems
 
High-Confidence Data Programming for Evaluating Suppression of Physiological ...
High-Confidence Data Programming for Evaluating Suppression of Physiological ...High-Confidence Data Programming for Evaluating Suppression of Physiological ...
High-Confidence Data Programming for Evaluating Suppression of Physiological ...
 
Data Generation with PROSPECT: a Probability Specification Tool
Data Generation with PROSPECT: a Probability Specification ToolData Generation with PROSPECT: a Probability Specification Tool
Data Generation with PROSPECT: a Probability Specification Tool
 
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
 
Confidence Composition (CoCo) for Dynamic Assurance of Learning-Enabled Auton...
Confidence Composition (CoCo) for Dynamic Assurance of Learning-Enabled Auton...Confidence Composition (CoCo) for Dynamic Assurance of Learning-Enabled Auton...
Confidence Composition (CoCo) for Dynamic Assurance of Learning-Enabled Auton...
 
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
 
On the Role of Assumptions in Engineering Smart Systems
On the Role of Assumptions in Engineering Smart SystemsOn the Role of Assumptions in Engineering Smart Systems
On the Role of Assumptions in Engineering Smart Systems
 
Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...
Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...
Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...
 
Overview of Epidemic Models for COVID-19
Overview of Epidemic Models for COVID-19Overview of Epidemic Models for COVID-19
Overview of Epidemic Models for COVID-19
 
Towards a Formal Framework for Hybrid Planning in Self-Adaptation
Towards a Formal Framework for Hybrid Planning in Self-AdaptationTowards a Formal Framework for Hybrid Planning in Self-Adaptation
Towards a Formal Framework for Hybrid Planning in Self-Adaptation
 
IPL: An Integration Property Language for Multi-Model Cyber-Physical Systems
IPL: An Integration Property Language for Multi-Model Cyber-Physical SystemsIPL: An Integration Property Language for Multi-Model Cyber-Physical Systems
IPL: An Integration Property Language for Multi-Model Cyber-Physical Systems
 
Challenges in Physical Modeling for Adaptation of Cyber-Physical Systems
Challenges in Physical Modeling for Adaptation of Cyber-Physical SystemsChallenges in Physical Modeling for Adaptation of Cyber-Physical Systems
Challenges in Physical Modeling for Adaptation of Cyber-Physical Systems
 
Hardware Power Modeling for Turtlebot
Hardware Power Modeling for TurtlebotHardware Power Modeling for Turtlebot
Hardware Power Modeling for Turtlebot
 
Integration Beyond Components and Models: Research Challenges and Directions
Integration Beyond Components and Models: Research Challenges and DirectionsIntegration Beyond Components and Models: Research Challenges and Directions
Integration Beyond Components and Models: Research Challenges and Directions
 

Dernier

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 

Dernier (20)

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 

Analytic Dependency Loops in Architectural Models of Cyber-Physical Systems

  • 1. Analytic Dependency Loops in Architectural Models of Cyber-Physical Systems 8th International Workshop on Model-based Architecting of Cyber-Physical and Embedded Systems (ACES-MB) September 28, 2015 Ottawa, Canada Ivan Ruchkin Bradley Schmerl David Garlan
  • 2. 2 Acknowledgments ● Collaborators: — Dionisio De Niz (SEI CMU) — Sagar Chaki (SEI CMU) — Ashwini Rao (ISR CMU) ● Sponsors: — NSF — DoD — NSA
  • 3. 3 Agenda ● Dependency loops in cyber-physical systems ● Related work and background ● Fixpoints and cases of loops ● Resolution techniques ● Wrap-up
  • 4. 4 Agenda ● Dependency loops in cyber-physical systems ● Related work and background ● Fixpoints and cases of loops ● Resolution techniques ● Wrap-up
  • 14. 14 Analytic Dependency Loops ● Appear in complex cyber-physical systems ● Important to address — Currently require expensive manual effort — May introduce subtle errors into designs ● No up-front, one-size-fits-all solution — Diverse disciplines and combinations of analyses — Different project scope and constraints ● Goal: develop concepts and methods for resolving such loops
  • 15. 15 Agenda ● Dependency loops in cyber-physical systems ● Related work and background ● Fixpoints and cases of loops ● Resolution techniques ● Wrap-up
  • 16. 16 Related Work ● Loops and dependencies in other contexts — Loop invariants in programming languages [1] — Deadlocks in dataflow systems [2] — Dependencies in design [3] ● Model evolution — Model transformations [4] — Analysis contracts[5] [1] P. Cousot and R. Cousot. Automatic synthesis of optimal invariant assertions, SIGART Bulletin 1977. [2] Y. Zhou and E. Lee. A Causality Interface for Deadlock Analysis in Dataflow, EMSOFT 2006. [3] A. Qamar. Model and Dependency Management in Mechatronic Design, PhD Thesis, 2013. [4] G. Bergmann, I. Rth, G. Varr, D. Varr. Change-driven model transformations, SoSyM 2011. [5] I. Ruchkin, D. De Niz, S. Chaki, D. Garlan. Contract-based Integration of Cyber-physical Analyses, EMSOFT 2014.
  • 17. 17 Background ● Analysis contract C is a tuple (I, O, A, G): — Inputs I — Outputs O — Assumptions A — Guarantees G ● Analysis A1 depends on analysis A2 iff: A1.I   A∩ 2.O ≠ ∅
  • 18. 18 Agenda ● Dependency loops in cyber-physical systems ● Related work and background ● Fixpoints and cases of loops ● Resolution techniques ● Wrap-up
  • 19. 19 Fixpoints ● System model M is a fixpoint (FP) — For analysis A if: A(M) = M — For dependency loop A1..AN if: ∀i:1..N · Ai(M) = M — “A solution to a loop” ● System model M is a candidate fixpoint (CFP) — For analysis A: M ⊨ A.G — For dependency loop A1..AN if: ∀i:1..N ∙ M ⊨ Ai.G — “Almost a solution to a loop”
  • 20. 20 Cases of Dependency Loops C1. Strong convergence — FP exists, and is reachable by any sequence of analyses C2. Weak convergence — FP exists, and is reachable by some sequence of analyses C3. Weak divergence — FP exists, but is not reachable by any sequence of analyses C4. Divergence — FP does not exist, but CFP exists C5. Strong divergence — Neither FP, nor CFP exist
  • 21. 21 Example: Strong & Weak Convergence
  • 23. 23 Agenda ● Dependency loops in cyber-physical systems ● Related work and background ● Fixpoints and cases of loops ● Resolution techniques ● Wrap-up
  • 24. 24 Approach 1. Use rich multi-view model 2. Find a fixpoint (or candidate) 3. Verify that a model is a fixpoint
  • 26. 26 Technique 1: Iterative Execution ● Execute analyses in some sequence — Random — Contract-guided — Model order-guided ● Applicability: strong and weak convergence ● Pros: — Simple, accessible — Can verify fixpoints ● Cons: — Computationally expensive — Heuristic, no guarantees
  • 27. 27 Technique 2: Constraint Solving ● Generate a constraint satisfaction problem — Using architectural model and guarantees — Does not execute analyses ● Applicability: — Finds CFP in all cases except strong divergence — Demonstrates absence of CFP in strong divergence ● Pros: — Exhaustive search within bounds ● Cons: — Results need to be verified with a different method — Relies on model translation to a constraint language
  • 28. 28 Technique 3: Genetic Search ● Derive hybrids of models — Crossover: M1 x M2 = M1   M⊕ 2   {∪ m Ɐ ⊆ M1   M∩ 2} – E.g., AAB x ABB = {AB, AAB, ABB, AABB} ● Applicable: — Find FP in convergence and weak divergence — Find CFP in divergence ● Pros: — Can find FPs/CFPs beyond constraint solving bounds ● Cons: — Heuristic, no guarantees
  • 29. 29 Summary of Resolution Techniques Case Iterative Execution Constraint Solving Genetic Search Find FP in strong conv. ✓ ✓ ✓ Verify FP in strong conv. ✓ Find FP in weak conv. ✓ ✓ Verify FP in weak conv. ✓ Find FP in weak div. ✓ ✓ Verify FP in weak div. ✓ Find CFP in div. ✓ ✓ Verify CFP in div. ✓ ✓ Detect absence of CFP in str. div. ✓
  • 30. 30 Agenda ● Dependency loops in cyber-physical systems ● Related work and background ● Fixpoints and cases of loops ● Resolution techniques ● Wrap-up
  • 31. 31 Future Work ● Other techniques for loop resolution ● Connect analysis contracts to system invariants — Discharge assumptions with invariants — Discharge invariants with guarantees ● Experiments on realistic system models
  • 32. 32 Summary ● Analytic dependency loops occur in complex systems — Contract specifications are insufficient to resolve ● This paper explored resolution techniques: — Iterative execution — Constraint solving — Genetic search
  • 33. 33 References ● Analysis contracts methodology: — I. Ruchkin, D. De Niz, S. Chaki, D. Garlan. Contract-based Integration of Cyber-physical Analyses, EMSOFT 2014. ● ACTIVE tool for verifying contracts: — I. Ruchkin, D. De Niz, S. Chaki, D. Garlan. ACTIVE: A Tool for Integrating Analysis Contracts, AVICPS 2014. ● Security and reliability analyses: — I. Ruchkin, A. Rao, D. De Niz, S. Chaki, D. Garlan. Eliminating Inter-Domain Vulnerabilities in Cyber- Physical Systems: An Analysis Contracts Approach, CPS- SPC 2015.
  • 34. 34 Q&A ● When to terminate the search? ● What views to use for constraint generation? ● What if no fixpoints/candidates found? — Involve humans — Probably irreconcilable requirements ● Resolving vs. avoiding the loop? ● Automated recognition of loop cases? ● General theorems about techniques?