robust control of timed systems
play

Robust control of timed systems Patricia Bouyer-Decitre LSV, CNRS - PowerPoint PPT Presentation

Robust control of timed systems Patricia Bouyer-Decitre LSV, CNRS & ENS Cachan, France Based on joint works with Nicolas Markey, Pierre-Alain Reynier and Ocan Sankur. Acknowledgment to Nicolas and Ocan for slides. Support from ERC project


  1. Introduction Are we doing the right job? The continuous-time semantics is an idealization of a physical system. It might not be proper for implementation: it assumes zero-delay transitions it assumes infinite precision of the clocks it assumes immediate communication between systems It may generate timing anomalies It does not exclude non-realizable behaviours: not only Zeno behaviours many convergence phenomena are hidden � this requires infinite precision and might not be realizable Important questions Is the real system correct when it is proven correct on the model? Does actual work transfer to real-world systems? To what extent? 8/38

  2. Introduction Example 1: Imprecision on clock values Frame capture [ACS10] 2 t.u. frame 0 frame 1 frame 2 frame 3 frame 4 frame 5 encod. 0 encod. 1 encod. 2 encod. 3 encod. 4 2 t.u. [ACS10] Abdellatif, Combaz, Sifakis. Model-based implementation of real-time applications. Int. Conf. Embedded Software , ACM 2010. 9/38

  3. Introduction Example 1: Imprecision on clock values Frame capture [ACS10] 2 t.u. frame 0 frame 1 frame 2 frame 3 frame 4 frame 5 encod. 0 encod. 1 encod. 2 encod. 3 encod. 4 2 + ǫ � A frame will eventually be skipped [ACS10] Abdellatif, Combaz, Sifakis. Model-based implementation of real-time applications. Int. Conf. Embedded Software , ACM 2010. 9/38

  4. Introduction Example 2: Strict timing constraints Mutual exclusion protocol [KLL + 97] r :=0 r :=0 P id r ==0 x id :=0 r = id x id :=0 x id :=0 x id > 2 x id ≤ 2 r := id [KLL+97] Kristoffersen, Laroussinie, Larsen, Pettersson, Yi. A compositional proof of a real-time mutual exclusion protocol. TAPSOFT , 1997. 10/38

  5. Introduction Example 2: Strict timing constraints Mutual exclusion protocol [KLL + 97] r :=0 r :=0 P id r ==0 x id :=0 r = id x id :=0 x id :=0 x id > 2 x id ≤ 2 r := id When P 1 and P 2 run in parallel (sharing variable r ), the state where both of them are in is not reachable. [KLL+97] Kristoffersen, Laroussinie, Larsen, Pettersson, Yi. A compositional proof of a real-time mutual exclusion protocol. TAPSOFT , 1997. 10/38

  6. Introduction Example 2: Strict timing constraints Mutual exclusion protocol [KLL + 97] r :=0 r :=0 P id r ==0 x id :=0 r = id x id :=0 x id :=0 x id > 2 x id ≤ 2 r := id When P 1 and P 2 run in parallel (sharing variable r ), the state where both of them are in is not reachable. This property is lost when x id > 2 is replaced with x id ≥ 2. [KLL+97] Kristoffersen, Laroussinie, Larsen, Pettersson, Yi. A compositional proof of a real-time mutual exclusion protocol. TAPSOFT , 1997. 10/38

  7. Introduction Example 3: Scheduling and timing anomaly Scheduling analysis with timed automata [AAM06] Goal: analyze a work-conserving scheduling policy on given scenarios (no machine is idle if a task is waiting for execution) Example of a scenario 0 1 2 3 4 5 6 7 M 1 A D E M 2 C B with the dependency constraints: A → B and C → D , E . A , D , E must be scheduled on machine M 1 1 B , C must be scheduled on machine M 2 2 C starts no sooner than 2 time units 3 [AAM06] Abdeddaim, Asarin, Maler. Scheduling with timed automata. Theor. Comp. Science , 2006. 11/38

  8. Introduction Example 3: Scheduling and timing anomaly Example of a scenario 0 1 2 3 4 5 6 7 M 1 A D E M 2 C B � Schedulable in 6 time units 11/38

  9. Introduction Example 3: Scheduling and timing anomaly Example of a scenario 0 1 2 3 4 5 6 7 M 1 A D E M 2 C B � Schedulable in 6 time units Unexpectedly, the duration of A drops to 1 . 999 11/38

  10. Introduction Example 3: Scheduling and timing anomaly Example of a scenario 0 1 2 3 4 5 6 7 M 1 A D E M 2 C B � Schedulable in 6 time units Unexpectedly, the duration of A drops to 1 . 999 0 1 2 3 4 5 6 7 M 1 A D E M 2 C B is not work-conserving 11/38

  11. Introduction Example 3: Scheduling and timing anomaly Example of a scenario 0 1 2 3 4 5 6 7 M 1 A D E M 2 C B � Schedulable in 6 time units Unexpectedly, the duration of A drops to 1 . 999 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 8 M 1 A D E M 1 A D E M 2 C B M 2 B C is work-conserving is not work-conserving and completes in 7.999 t.u. 11/38

  12. Introduction Example 3: Scheduling and timing anomaly Example of a scenario 0 1 2 3 4 5 6 7 M 1 A D E M 2 C B � Schedulable in 6 time units Unexpectedly, the duration of A drops to 1 . 999 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 8 M 1 A D E M 1 A D E M 2 C B M 2 B C is work-conserving is not work-conserving and completes in 7.999 t.u. � Standard analysis does not capture this timing anomaly 11/38

  13. Introduction Example 4: Zeno behaviours y x < 1 ∧ y < 1 1 x :=0 y =1 x 0 1 12/38

  14. Introduction Example 4: Zeno behaviours y x < 1 ∧ y < 1 1 x :=0 y =1 x 0 1 Those are easy to detect and can be handled; [HS11] [HS11] Herbreteau, Srivathsan. Coarse abstractions make Zeno behaviours difficult to detect, Logic. Meth. Comp. Science , 2011. 12/38

  15. Introduction Example 4: Zeno behaviours y x < 1 ∧ y < 1 1 x :=0 y =1 x 0 1 Those are easy to detect and can be handled; [HS11] They are easy to remove by construction. [HS11] Herbreteau, Srivathsan. Coarse abstractions make Zeno behaviours difficult to detect, Logic. Meth. Comp. Science , 2011. 12/38

  16. Introduction Example 5: More complex convergence phenomena x ≤ 2 , x :=0 x =0 ∧ y ≥ 2 x =1 y :=0 y ≥ 2 , y :=0 13/38

  17. Introduction Example 5: More complex convergence phenomena y 2 x ≤ 2 , x :=0 x =0 ∧ y ≥ 2 x =1 1 y :=0 y ≥ 2 , y :=0 x 0 1 2 13/38

  18. Introduction Example 5: More complex convergence phenomena y 2 x ≤ 2 , x :=0 x =0 ∧ y ≥ 2 x =1 1 y :=0 y ≥ 2 , y :=0 x 0 1 2 13/38

  19. Introduction Example 5: More complex convergence phenomena y 2 x ≤ 2 , x :=0 x =0 ∧ y ≥ 2 x =1 1 y :=0 y ≥ 2 , y :=0 x 0 1 2 13/38

  20. Introduction Example 5: More complex convergence phenomena y 2 x ≤ 2 , x :=0 x =0 ∧ y ≥ 2 x =1 1 y :=0 y ≥ 2 , y :=0 x 0 1 2 13/38

  21. Introduction Example 5: More complex convergence phenomena y 2 x ≤ 2 , x :=0 x =0 ∧ y ≥ 2 x =1 1 y :=0 y ≥ 2 , y :=0 x 0 1 2 13/38

  22. Introduction Example 5: More complex convergence phenomena y 2 x ≤ 2 , x :=0 x =0 ∧ y ≥ 2 x =1 1 y :=0 y ≥ 2 , y :=0 x 0 1 2 13/38

  23. Introduction Example 5: More complex convergence phenomena y 2 x ≤ 2 , x :=0 x =0 ∧ y ≥ 2 x =1 1 y :=0 y ≥ 2 , y :=0 x 0 1 2 13/38

  24. Introduction Example 5: More complex convergence phenomena y 2 x ≤ 2 , x :=0 x =0 ∧ y ≥ 2 x =1 1 y :=0 y ≥ 2 , y :=0 x 0 1 2 13/38

  25. Introduction Example 5: More complex convergence phenomena y 2 x ≤ 2 , x :=0 x =0 ∧ y ≥ 2 x =1 1 y :=0 y ≥ 2 , y :=0 x 0 1 2 13/38

  26. Introduction Example 5: More complex convergence phenomena y 2 x ≤ 2 , x :=0 x =0 ∧ y ≥ 2 x =1 1 y :=0 y ≥ 2 , y :=0 x 0 1 2 13/38

  27. Introduction Example 5: More complex convergence phenomena y 2 x ≤ 2 , x :=0 x =0 ∧ y ≥ 2 x =1 1 y :=0 y ≥ 2 , y :=0 x 0 1 2 13/38

  28. Introduction Example 5: More complex convergence phenomena y 2 x ≤ 2 , x :=0 x =0 ∧ y ≥ 2 x =1 1 y :=0 y ≥ 2 , y :=0 x 0 1 2 13/38

  29. Introduction Example 5: More complex convergence phenomena y 2 x ≤ 2 , x :=0 x =0 ∧ y ≥ 2 x =1 1 y :=0 y ≥ 2 , y :=0 x 0 1 2 13/38

  30. Introduction Example 5: More complex convergence phenomena y 2 x ≤ 2 , x :=0 x =0 ∧ y ≥ 2 x =1 1 y :=0 y ≥ 2 , y :=0 x 0 1 2 � Value of clock x when hitting is converging, even though global time diverges 13/38

  31. Introduction The goal Add robustness to the theory of timed automata 14/38

  32. Introduction The goal Add robustness to the theory of timed automata We need to understand what is the real system behind the mathematical model, and also which implementation we have in mind, if any. 14/38

  33. Introduction The goal Add robustness to the theory of timed automata We need to understand what is the real system behind the mathematical model, and also which implementation we have in mind, if any. Aim: provide frameworks to build correct systems 14/38

  34. Introduction The goal Add robustness to the theory of timed automata We need to understand what is the real system behind the mathematical model, and also which implementation we have in mind, if any. Aim: provide frameworks to build robustly correct systems 14/38

  35. Introduction The goal Add robustness to the theory of timed automata We need to understand what is the real system behind the mathematical model, and also which implementation we have in mind, if any. Aim: provide frameworks to build robustly correct systems � Robustness calls for specific theories for each application areas 14/38

  36. Introduction The goal Add robustness to the theory of timed automata We need to understand what is the real system behind the mathematical model, and also which implementation we have in mind, if any. Aim: provide frameworks to build robustly correct systems � Robustness calls for specific theories for each application areas Rest of the talk We present a couple of frameworks that have been developed recently in this context 14/38

  37. Robust “black-box” model-checking Outline 1. Introduction 2. Robust “black-box” model-checking Parameterized enlarged semantics Parameterized shrunk semantics 3. Robust guided model-checking Excess semantics Conservative semantics 4. Conclusion 15/38

  38. Robust “black-box” model-checking Robust “black-box” model-checking approach Idea Capture any real (or approximate) behaviours (e.g. the implementation) in the verification process 16/38

  39. Robust “black-box” model-checking Robust “black-box” model-checking approach Idea Capture any real (or approximate) behaviours (e.g. the implementation) in the verification process Due to imprecisions, “standard” correctness of A �⇒ correctness of A real 16/38

  40. Robust “black-box” model-checking Robust “black-box” model-checking approach Idea Capture any real (or approximate) behaviours (e.g. the implementation) in the verification process Due to imprecisions, “standard” correctness of A �⇒ correctness of A real � We aim at proposing frameworks in which we will ensure the correctness of the real behaviour of the system 16/38

  41. Robust “black-box” model-checking Robust “black-box” model-checking approach Idea Capture any real (or approximate) behaviours (e.g. the implementation) in the verification process Due to imprecisions, “standard” correctness of A �⇒ correctness of A real � We aim at proposing frameworks in which we will ensure the correctness of the real behaviour of the system We describe two such frameworks: either we implement A and we prove: 1 “robust” correctness of A ⇒ correctness of A real 16/38

  42. Robust “black-box” model-checking Robust “black-box” model-checking approach Idea Capture any real (or approximate) behaviours (e.g. the implementation) in the verification process Due to imprecisions, “standard” correctness of A �⇒ correctness of A real � We aim at proposing frameworks in which we will ensure the correctness of the real behaviour of the system We describe two such frameworks: either we implement A and we prove: 1 “robust” correctness of A ⇒ correctness of A real or we build and implement B , and we prove: 2 correctness of A ⇒ “robust” correctness of B ⇒ correctness of B real 16/38

  43. Robust “black-box” model-checking Outline 1. Introduction 2. Robust “black-box” model-checking Parameterized enlarged semantics Parameterized shrunk semantics 3. Robust guided model-checking Excess semantics Conservative semantics 4. Conclusion 17/38

  44. Robust “black-box” model-checking Parameterized enlarged semantics for timed automata A transition can be taken at any time in [ t − δ ; t + δ ] 18/38

  45. Robust “black-box” model-checking Parameterized enlarged semantics for timed automata A transition can be taken at any time in [ t − δ ; t + δ ] Example Given a parameter δ , x ≤ 2 , x :=0 x =0 ∧ y ≥ 2 x =1 y :=0 y ≥ 2 , y :=0 is transformed into x ≤ 2+ δ, x :=0 x ≤ δ ∧ y ≥ 2 − δ 1 − δ ≤ x ≤ 1+ δ y :=0 y ≥ 2 − δ, y :=0 18/38

  46. Robust “black-box” model-checking Parameterized enlarged semantics – Discussion What is the relevance of this semantics? This is a worst-case approach This captures approximate behaviours of the system One can define program semantics such that for every ǫ > 0: A ⊆ program ǫ ( A ) ⊆ A f ( ǫ ) ǫ : parameters of the semantics [DDR04] De Wulf, Doyen, Raskin. Almost ASAP semantics: From timed models to timed implementations HSCC , 2004. [SBM11] Sankur, Bouyer, Markey. Shrinking Timed Automata. FSTTCS , 2011. 19/38

  47. Robust “black-box” model-checking Parameterized enlarged semantics – Discussion What is the relevance of this semantics? This is a worst-case approach This captures approximate behaviours of the system One can define program semantics such that for every ǫ > 0: A ⊆ program ǫ ( A ) ⊆ A f ( ǫ ) ǫ : parameters of the semantics Methodology Design A Verify A δ (better if δ is a parameter) Implement A 19/38

  48. Robust “black-box” model-checking Parameterized enlarged semantics – Discussion What is the relevance of this semantics? This is a worst-case approach This captures approximate behaviours of the system One can define program semantics such that for every ǫ > 0: A ⊆ program ǫ ( A ) ⊆ A f ( ǫ ) ǫ : parameters of the semantics Methodology Design A Verify A δ (better if δ is a parameter) Implement A � This is good for designing systems with simple timing constraints (e.g. equalities). 19/38

  49. Robust “black-box” model-checking Parameterized enlarged semantics – Algorithmics � It adds extra behaviours, however small may be parameter δ 20/38

  50. Robust “black-box” model-checking Parameterized enlarged semantics – Algorithmics � It adds extra behaviours, however small may be parameter δ Example y 3 2 1 x 0 1 2 3 x ≤ 2 , x :=0 x =0 ∧ y ≥ 2 x =1 y :=0 y ≥ 2 , y :=0 20/38

  51. Robust “black-box” model-checking Parameterized enlarged semantics – Algorithmics � It adds extra behaviours, however small may be parameter δ Example y 3 2 1 x 0 1 2 3 x ≤ 2 , x :=0 x =0 ∧ y ≥ 2 x =1 y :=0 y ≥ 2 , y :=0 20/38

  52. Robust “black-box” model-checking Parameterized enlarged semantics – Algorithmics � It adds extra behaviours, however small may be parameter δ Example y 3 2 1 x 0 1 2 3 x ≤ 2 , x :=0 x =0 ∧ y ≥ 2 x =1 y :=0 y ≥ 2 , y :=0 20/38

  53. Robust “black-box” model-checking Parameterized enlarged semantics – Algorithmics � It adds extra behaviours, however small may be parameter δ Example y 3 2 1 x 0 1 2 3 x ≤ 2 , x :=0 x =0 ∧ y ≥ 2 x =1 y :=0 y ≥ 2 , y :=0 20/38

  54. Robust “black-box” model-checking Parameterized enlarged semantics – Algorithmics � It adds extra behaviours, however small may be parameter δ Example y 3 2 1 x 0 1 2 3 x ≤ 2 , x :=0 x =0 ∧ y ≥ 2 x =1 y :=0 y ≥ 2 , y :=0 20/38

  55. Robust “black-box” model-checking Parameterized enlarged semantics – Algorithmics � It adds extra behaviours, however small may be parameter δ Example y 3 2 1 x 0 1 2 3 x ≤ 2 , x :=0 x =0 ∧ y ≥ 2 x =1 y :=0 y ≥ 2 , y :=0 20/38

  56. Robust “black-box” model-checking Parameterized enlarged semantics – Algorithmics � It adds extra behaviours, however small may be parameter δ Example y 3 2 1 x 0 1 2 3 x ≤ 2 , x :=0 x =0 ∧ y ≥ 2 x =1 y :=0 y ≥ 2 , y :=0 20/38

  57. Robust “black-box” model-checking Parameterized enlarged semantics – Algorithmics � It adds extra behaviours, however small may be parameter δ Example y 3 2 1 x 0 1 2 3 x ≤ 2 , x :=0 x =0 ∧ y ≥ 2 x =1 y :=0 y ≥ 2 , y :=0 20/38

  58. Robust “black-box” model-checking Parameterized enlarged semantics – Algorithmics � It adds extra behaviours, however small may be parameter δ Example y y 3 3 2 2 1 1 x x 0 1 2 3 0 1 2 3 x ≤ 2+ δ, x :=0 1 − δ ≤ x ≤ 1+ δ x ≤ δ ∧ y ≥ 2 − δ y :=0 y ≥ 2 − δ, y :=0 20/38

  59. Robust “black-box” model-checking Parameterized enlarged semantics – Algorithmics � It adds extra behaviours, however small may be parameter δ Example y y 3 3 2 2 1 1 x x 0 1 2 3 0 1 2 3 x ≤ 2+ δ, x :=0 1 − δ ≤ x ≤ 1+ δ x ≤ δ ∧ y ≥ 2 − δ y :=0 y ≥ 2 − δ, y :=0 20/38

  60. Robust “black-box” model-checking Parameterized enlarged semantics – Algorithmics � It adds extra behaviours, however small may be parameter δ Example y y 3 3 2 2 1 1 x x 0 1 2 3 0 1 2 3 x ≤ 2+ δ, x :=0 1 − δ ≤ x ≤ 1+ δ x ≤ δ ∧ y ≥ 2 − δ y :=0 y ≥ 2 − δ, y :=0 20/38

  61. Robust “black-box” model-checking Parameterized enlarged semantics – Algorithmics � It adds extra behaviours, however small may be parameter δ Example y y 3 3 2 2 1 1 x x 0 1 2 3 0 1 2 3 x ≤ 2+ δ, x :=0 1 − δ ≤ x ≤ 1+ δ x ≤ δ ∧ y ≥ 2 − δ y :=0 y ≥ 2 − δ, y :=0 20/38

  62. Robust “black-box” model-checking Parameterized enlarged semantics – Algorithmics � It adds extra behaviours, however small may be parameter δ Example y y 3 3 2 2 1 1 x x 0 1 2 3 0 1 2 3 x ≤ 2+ δ, x :=0 1 − δ ≤ x ≤ 1+ δ x ≤ δ ∧ y ≥ 2 − δ y :=0 y ≥ 2 − δ, y :=0 20/38

  63. Robust “black-box” model-checking Parameterized enlarged semantics – Algorithmics � It adds extra behaviours, however small may be parameter δ Example y y 3 3 2 2 1 1 x x 0 1 2 3 0 1 2 3 x ≤ 2+ δ, x :=0 1 − δ ≤ x ≤ 1+ δ x ≤ δ ∧ y ≥ 2 − δ y :=0 y ≥ 2 − δ, y :=0 20/38

Recommend


More recommend