skip to main content
10.1145/3302504.3311797acmconferencesArticle/Chapter ViewAbstractPublication PagescpsweekConference Proceedingsconference-collections
research-article

On the decidability of linear bounded periodic cyber-physical systems

Published: 16 April 2019 Publication History

Abstract

Cyber-Physical Systems (CPSs) are integrations of distributed computing systems with physical processes via a networking with actuators and sensors, where feedback loops among the components allow the physical processes to affect the computations and vice versa. Although CPSs can be found in several complex and sometimes critical real-world domains, their verification and validation often relies on simulation-test systems rather then automatic methodologies to formally verify safety requirements. In this work, we prove the decidability of the reachability problem for discrete-time linear CPSs whose physical process in isolation has a periodic behavior, up to an initial transitory phase.

References

[1]
Manindr Agrawal and P.S. Thiagarajan. 2004. Lazy Rectangular Hybrid Automata. In Proceedings of the 7th. International Workshop on Hybrid Systems: Computation and Control (HSCC'04) (Lecture Notes in Computer Science), Vol. 2993. Springer, 1--15.
[2]
Manindr Agrawal and P. S. Thiagarajan. 2005. The Discrete Time Behavior of Lazy Linear Hybrid Automata. In Proceedings of the 8th. International Workshop on Hybrid Systems: Computation and Control (HSCC'05) (Lecture Notes in Computer Science), Vol. 3414. Springer, 55--69.
[3]
Rajeev Alur, Costas Courcoubetis, Nicolas Halbwachs, Thomas A. Henzinger, Pei-Hsin Ho, Xavier Nicollin, Alfredo Olivero, Joseph Sifakis, and Sergio Yovine. 1995. The Algorithmic Analysis of Hybrid Systems. Theor. Comput. Sci. 138, 1 (1995), 3--34.
[4]
Rajeev Alur and David L. Dill. 1994. A Theory of Timed Automata. Theor. Comput. Sci. 126, 2 (1994), 183--235.
[5]
Rajeev Alur, Thomas A. Henzinger, and Pei-Hsin Ho. 1996. Automatic Symbolic Verification of Embedded Systems. IEEE Trans. Software Eng. 22, 3 (1996), 181--201.
[6]
Martin Fränzle. 1999. Analysis of Hybrid Systems: An Ounce of Realism Can Save an Infinity of States. In Proceedings of the 13th. International Workshop on Computer Science Logic (CSL'99) (Lecture Notes in Computer Science), Vol. 1683. Springer, 126--140.
[7]
Thomas A. Henzinger and Peter W. Kopke. 1999. Discrete-Time Control for Rectangular Hybrid Automata. Theor. Comput. Sci. 221, 1 (1999), 369--392.
[8]
Thomas A. Henzinger, Peter W. Kopke, Anuj Puri, and Pravin Varaiya. 1998. What's Decidable about Hybrid Automata? J. Comput. System Sci. 57,1 (1998), 94--124.
[9]
Susmit Jha, Bryan A. Brady, and Sanjit A. Seshia. 2007. Symbolic Reachability Analysis of Lazy Linear Hybrid Automata. In Proceedings of the 5th. International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS'07) (Lecture Notes in Computer Science), Vol. 4763. Springer, 241âĂŞ256.
[10]
Siddhartha Kumar Khaitan and James D. McCalley. 2015. Design Techniques and Applications of Cyberphysical Systems: A Survey. IEEE Systems Journal 9, 2 (2015), 350--365.
[11]
Gerardo Lafferriere, George J. Pappas, and Shankar Sastry. 2000. O-Minimal Hybrid Sstems. Mathematics of Control, Signals, and Systems 13, 1 (2000), 1--21.
[12]
Joachim Lambek. 1961. How to Program an Infinite Abacus. Canad. Math. Bull. 4 (1961), 295--302.
[13]
Ruggero Lanotte and Massimo Merro. 2018. A semantic theory of the Internet of Things. Information and Computation 259, 1 (2018), 72--101.
[14]
Ruggero Lanotte, Massimo Merro, and Andrei Munteanu. 2018. A Modest Security Analysis of Cyber-Physical Systems: A Case Study. In Proceedings of the 38th IFIP WG 6.1 International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE'18) (Lecture Notes in Computer Science), Vol. 10854. Springer, 58--78.
[15]
Ruggero Lanotte, Massimo Merro, Andrei Munteanu, and Luca Viganò. 2019. A Formal Approach to Physics-Based Attacks in Cyber-Physical Systems (Exended Version). CoRR abs/1902.04572 (2019)
[16]
Ruggero Lanotte, Massimo Merro, Riccardo Muradore, and Luca Viganò. 2017. A Formal Approach to Cyber-Physical Attacks. In Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF'17). IEEE Computer Society, 436--450.
[17]
Ruggero Lanotte, Massimo Merro, and Simone Tini. 2018. Towards a formal notion of impact metric for cyber-physical attacks. In Proceedings of the 14th International Conference on Integrated Formal Methods (IFM'18) (Lecture Notes in Computer Science), Vol. 11023. Springer, 296--315.
[18]
Ruggero Lanotte, Massimo Merro, and Simone Tini. 2019. A Probabilistic Calculus of Cyber-Physical Systems. Information and Computation (2019).
[19]
Marvin L. Minsky. 1961. Recursive Unsolvability of Post's Problem of "Tag" and other Topics in Theory of Turing Machines. The Annals of Mathematics 74, 3 (1961), 437--455.
[20]
Ben Noble and James W. Daniel. 1988. Applied linear algebra. Prentice Hall.
[21]
André Platzer. 2018. Logical Foundations of Cyber-Physical Systems. Springer.
[22]
Pavithra Prabhakar, Vladimeros Vladimerou, Mahesh Viswanathan, and Geir E. Dullerud. 2015. A decidable class of planar linear hybrid systems. Theoretical Computer Science 574 (2015), 1 -- 17.
[23]
Anuj Puri and Pravin Varaiya. 1994. Decidability of Hybrid Systems with Rectangular Differential Inclusions. In Proceedings of the 6th International Conference on Computer Aided Verification (CAV '94) (Lecture Notes in Computer Science), Vol. 818. Springer, 95--104.
[24]
Nima Roohi. 2017. Remedies for building reliable cyber-physical systems. Ph.D. Dissertation. University of Illinois at Urbana-Champaign.
[25]
Paulo Tabuada and George J. Pappas. 2003. Model Checking LTL over Controllable Linear Systems is Decidable. In Proceedings of the 6th International Workshop on Hybrid Systems: Computation and Control (HSCC'03) (Lecture Notes in Computer Science), Vol. 2623. Springer, 498--513.
[26]
Paulo Tabuada and George J. Pappas. 2006. Linear Time Logic Control of Discrete-Time Linear Systems. IEEE Trans. Automat. Control 51(12) (2006), 1862--1877.
[27]
René Vidal, Shawn Schaffert, Omid Shakernia, John Lygeros, and Shankar Sastry. 2001. Decidable and semi-decidable controller synthesis for classes of discrete time hybrid systems. In Proceedings of the 40th IEEE Conference on Decision and Control (CDC'01), Vol. 2. IEEE Computer Society, 1243--1248.
[28]
Vladimeros Vladimerou, Pavithra Prabhakar, Mahesh Viswanathan, and Geir E. Dullerud. 2008. STORMED Hybrid Systems. In Proceedings of the 35th International Colloquium on Automata, Languages and Programming (ICALP'08) (Lecture Notes in Computer Science), Vol. 5126. Springer, 136--147.
[29]
Yuriy Zacchia Lun, Alessandro D'Innocenzo, Francesco Smarra, Ivano Malavolta, and Maria Domenica Di Benedetto. 2019. State of the art of cyber-physical systems security: An automatic control perspective. Journal of Systems and Software 149 (2019), 174--216.

Cited By

View all
  • (2023)Impact Analysis of Coordinated Cyber-Physical Attacks via Statistical Model Checking: A Case StudyFormal Techniques for Distributed Objects, Components, and Systems10.1007/978-3-031-35355-0_6(75-94)Online publication date: 19-Jun-2023
  • (2020)Impact Analysis of Cyber-Physical Attacks on a Water Tank System via Statistical Model CheckingProceedings of the 8th International Conference on Formal Methods in Software Engineering10.1145/3372020.3391563(34-43)Online publication date: 7-Oct-2020
  • (2020)Worst-case topological entropy and minimal data rate for state observation of switched linear systemsProceedings of the 23rd International Conference on Hybrid Systems: Computation and Control10.1145/3365365.3382195(1-11)Online publication date: 22-Apr-2020

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
HSCC '19: Proceedings of the 22nd ACM International Conference on Hybrid Systems: Computation and Control
April 2019
299 pages
ISBN:9781450362825
DOI:10.1145/3302504
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 April 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. formal safety verification
  2. linear cyber-physical systems
  3. reachability problem

Qualifiers

  • Research-article

Conference

HSCC '19
Sponsor:

Acceptance Rates

Overall Acceptance Rate 153 of 373 submissions, 41%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Impact Analysis of Coordinated Cyber-Physical Attacks via Statistical Model Checking: A Case StudyFormal Techniques for Distributed Objects, Components, and Systems10.1007/978-3-031-35355-0_6(75-94)Online publication date: 19-Jun-2023
  • (2020)Impact Analysis of Cyber-Physical Attacks on a Water Tank System via Statistical Model CheckingProceedings of the 8th International Conference on Formal Methods in Software Engineering10.1145/3372020.3391563(34-43)Online publication date: 7-Oct-2020
  • (2020)Worst-case topological entropy and minimal data rate for state observation of switched linear systemsProceedings of the 23rd International Conference on Hybrid Systems: Computation and Control10.1145/3365365.3382195(1-11)Online publication date: 22-Apr-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media