Towards a Statistical Model Checking Method for Safety-Critical Cyber-Physical System Verification

Page created by Louise Lloyd
 
CONTINUE READING
Hindawi
Security and Communication Networks
Volume 2021, Article ID 5536722, 12 pages
https://doi.org/10.1155/2021/5536722

Research Article
Towards a Statistical Model Checking Method for Safety-Critical
Cyber-Physical System Verification

 Jian Xie ,1,2,3 Wenan Tan,1,2,3 Bingwu Fang ,2,4 and Zhiqiu Huang1,2,3
 1
 College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China
 2
 Key Laboratory of Safety-Critical Software, Nanjing University of Aeronautics and Astronautics, Nanjing, China
 3
 Collaborative Innovation Center of Novel Software Technology and Industrialization, Nanjing, China
 4
 College of Information Engineering, Anhui Finance and Trade Vocational College, Hefei, China

 Correspondence should be addressed to Bingwu Fang; bingwufang@163.com

 Received 10 February 2021; Revised 2 April 2021; Accepted 16 April 2021; Published 18 May 2021

 Academic Editor: Weizhi Meng

 Copyright © 2021 Jian Xie et al. This is an open access article distributed under the Creative Commons Attribution License, which
 permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

 Safety-Critical Cyber-Physical System (SCCPS) refers to the system that if the system fails or its key functions fail, it will cause
 casualties, property damage, environmental damage, and other catastrophic consequences. Therefore, it is vital to verify the safety
 of safety critical systems. In the community, the SCCPS safety verification mainly relies on the statistical model checking
 methodology, but for SCCPS with extremely high safety requirements, the statistical model checking method is difficult/infeasible
 to sample the extremely small probability event since the probability of the system violating the safety is very low (rare property).
 In response to this problem, we propose a new method of statistical model checking for high-safety SCCPS. Firstly, with the
 CTMC-approximated SCCPS path probability space model, it leverages the maximum likelihood estimation method to learn the
 parameters of CTMC. Then, the embedded DTMC can be derived from CTMC, and a cross-entropy optimization model based on
 DTMC can be constructed. Finally, we propose an algorithm of iteratively learning the optimal importance sampling distribution
 on the discrete path space and an algorithm to check the statistical model of verifying the rare attribute. Eventually, experimental
 results show that the method proposed in this paper can effectively verify the rare attributes of SCCPS. Under the same sample
 size, comparing with the heuristic importance sampling methods, the estimated value of this method can be better distributed
 around the mean value, and the related standard deviation and relative error are reduced by more than an order of magnitude.

1. Introduction continuously changing behavior in their physical layer is
 intertwined with the discrete changing behavior in their
Safety-Critical Cyber-Physical System (SCCPS) is charac- decision control layer. Their state spaces are infinite as well.
terized with high safety and high reliability and are widely It increases the difficulty and brings severe challenges to the
used in fields closely related to the national economy and safety analysis and verification of SCCPS. However, the
people’s livelihoods, such as aerospace, nuclear industry, traditional model checking has the problem of state space
public transportation, finance, and medical care. Once the explosion, and it is difficult to effectively verify it [11].
execution of such system fails, it will deeply threaten the safety With the execution path of the sampling system, Sta-
of human’s life and property [1–3]. Therefore, it is vital to tistical Model Checking (SMC) uses statistical analysis
analyze and verify the safety and reliability of safety-critical techniques to approximate the probability that the target
systems, and it is of great significance to the design and system meets the sequential logic attributes and can provide
development of safety-critical systems. Indeed, it has attracted arbitrarily small error limits [12–14]. Because SMC does not
wide attention from researchers and has extensively grown as need to analyze the complex logic inside the target system to
a prominent research topic in the community [4–7]. verify the timing logic properties of the system, it can ef-
 Essentially, SCCPS is a kind of complex cyber-physical fectively avoid the complexity of the system and the ex-
fusion system [8–10]. For this kind of systems, the plosion of the state space [15, 16]. Therefore, SMC is the
2 Security and Communication Networks

most effective solution to verify the timing properties of (i) The probability that M satisfies the attribute φ:
complex SCCPS [12, 17–19]. However, for SCCPS requiring Pr(M⊨π)
extremely high safety, the probability of occurrence of the (ii) Whether the probability of M satisfying the attribute
negative events of its safety attributes and the probability of φ is higher than or equal to the threshold θ:
system failures are extremely low. It is infeasible for SMC to M⊨Pr(≥θ) (φ)
sample extremely low probability events. Thus, how to use
SMC to verify the extremely secure SCCPS is an urgent In SMC, it first simulates the execution of the system
problem to be solved [20, 21]. model M to extract a random execution path ω. Then, the
 To date, verification of the SMC rare attributes mainly BLTL model detector is used to determine whether ω sat-
relies on the importance sampling method. For CTMC and isfies the attribute φ, and a certain number of samples will be
DTMC random models, Reijsbergen et al. [22] and Barbot generated after multiple simulations. It further leverages the
et al. [23] utilized the heuristic methods to obtain an statistical method to perform statistical analysis on the
importance sampling distribution to complete the attribute samples to assess the probability of the system model M
verification of the two models, respectively. Clarke and satisfying the attribute φ, as well as give the confidence
Zuliani [24] proposed the cross-entropy minimization interval or the estimated error margin. Let I(ω) represent the
importance sampling-based SMC method to verify the output result of the BLTL model detector. If ω⊨π, I(ω) � 1;
safety properties of the Stateflow/Simulink model system. otherwise, it is 0. I(ω) is a Bernoulli random variable, so the
Zuliani et al. [17] used the SMC method in his study [24] to behavior of M can be modeled by the Bernoulli distribution
verify the secure attribute of the discrete-time SHS. The with a parameter p:
methods proposed by Clarke and Zuliani assume that the Pr(I(ω) � 1) � p,
distribution of the system path space is an exponential (1)
distribution. By simply increasing the failure rate of the Pr(I(ω) � 0) � 1 − p.
system parameters, several paths that satisfy the rare at-
 The parameter p represents the probability that the
tributes are extracted at one time to calculate the optimal
 model M satisfies the BLTL attribute φ. With the Bernoulli
parameters for the exponential distribution to obtain an
 distribution, we note that p � E[I(ω)], var[I(ω)] � p ×
importance sampling distribution [25]. J´egourel et al. [26]
 (12212p). Since the value of p is unknown, the goal of SMC is
leveraged the cross-entropy minimum optimization
 to estimate the value of p.
method in the random model of a random guardian
 SMC can be divided into two categories: hypothesis
command system, which can approximate the path dis-
 testing and parameter estimation. The hypothesis testing is
tribution of the system by increasing the number of
 used to determine whether the probability of the system
commands (number of parameters), to obtain an impor-
 satisfying the temporal logic attribute is greater than or equal
tance sampling distribution in the random model. How-
 to a given threshold, which is a qualitative result, while the
ever, the optimal importance sampling distribution
 parameter estimation is a quantitative result to represent the
obtained with the aforementioned methods is not from the
 approximate probability of the system satisfying the tem-
distribution family of the system path space, but essentially
 poral logic attribute. SMC qualitative algorithms include the
is a heuristic importance sampling method. Thus, the
 single sampling plan (SSP) algorithm [27], the sequential
verification results are only rough approximation.
 probability ratio test (SPRT) algorithm [27], and the
 In this paper, we propose a method with the SCCPS path
 Bayesian hypothesis test (BHT) algorithm [18]. SMC
space to construct a cross-entropy optimization model and
 quantitative algorithms mainly include the approximate
use an iterative learning method to obtain an optimal im-
 probabilistic model checking (APMC) [28] algorithm and
portance sampling distribution from the parameterized
 the Bayesian interval estimation testing (BIET) algorithm
distribution cluster of the path space. It can ensure that the
 [18]. Kim et al. [29] conducted an empirical evaluation on
optimal importance sampling distribution is from the spatial
 the performance and applicability of the four algorithms
distribution family in the SCCPS path, and the iterative
 (i.e., SSP, SPRT, BHT, and BIET).
learning method can ensure that the distribution evenly
covers the unsafe path distribution area. As evaluated in our
experiments, the accuracy and efficiency of the rare attribute
verification are significantly improved. 2.2. Safety Requirement Specification. In this paper, we use
 Bounded Linear Temporal Logic (BTCL) as our specification
 language. BLTL restricts Linear Temporal Logic (LTL) with
 time bounds on the temporal operators. Formally, the syntax
2. Background of BLTL is given as
2.1. Statistical Model Checking. Statistical Model Checking φ ⩴ x ∼ v|(φ 1) ∨ φ 2|(φ 1 ∧ φ 2)|φ 1φ 1 ∪ t φ 2, (2)
(SMC) can be simply described as follows: given a system
model M and system properties φ described by the bounded where ∼∈ { ≤ , ≥ , �}, x ∈ SV (the finite set of state variables),
linear temporal logic (BLTL) [18], it uses the Monte Carlo v ∈ R, t ∈ R≥0 , and ∨, ∧, and are the usual Boolean con-
sampling, model checking, and statistical analysis techniques nectives. The formulas x ∼ v is called the atomic proposi-
to qualitatively/quantitatively verify the following two tions (AP). The formula φ{_1} ∪ t φ{_2} will return true if and
questions: only if φ{_2} is true and φ{_1} will hold within the time t. The
Security and Communication Networks 3

operators ◇t and □t can be defined as follows by using the (1) If φ is of the form x ∼ v, σ k ⊨φ if σ k ⊨φ since sk+I �
 ∪ t operator: ◇tφ � True ∪ tφ, which required φ to hold true sk+I and tk+I � tk+I by using [17] for i � 0.
within time t (true). □tφ �¬◇t¬φ requires φ to hold true up (2) If φ is of the form φ1 ∨φ2 ,
to time t.
 The semantics of BLTL formulas [28, 30, 31] is defined ⎪
 ⎧ iff σ k ⊨φ1 or σ k ⊨φ2 ,
 ⎪
 ⎪
with respect to system traces (or executions). A trace is a ⎨
 σ k ⊨φ1 ∨φ2 ⎪ iff σ k ⊨φ1 or σ k ⊨φ2 , (3)
sequence σ � (s0 , t0 ), (s1 , t1 ), . . ., where si is the state of the ⎪
 ⎪
 ⎩
system at the represented time ti . The pair (si , ti ) expresses iff σ k ⊨φ1 ∨φ2 ,
the fact that the system moved to state si+1 after having spent
ti time units in state si . If the trace σ satisfies the property φ,
we write σ⊨φ. The trace suffix of σ starting at k ∈ N is by induction hypothesis as #(φ1 ∨φ2 ) ≥ #(φ1 ) and
denoted by σ k , and σ 0 denotes the full trace σ. #(φ1 ∨φ2 ) ≥ #(φ2 ). The proof is similar to φ1 and
 The semantics of BLTL for a trace σ k is defined as φ1 ∩ φ2 .
follows: (3) If φ is of the form φ1 ∪ t φ2 , σ k ⊨φ1 ∪ t φ2 if the fol-
 lowing three conditions are satisfied:
 (i) σ k ⊨x ∼ v, iff x ∼ v holds true in state sk
 ∼
 (ii) σ k ⊨φ1 ∧φ2 , iff σ k ⊨φ1 and σ k ⊨φ2 (a′ ). 0≤l
4 Security and Communication Networks

 standard Wiener process defined in the real 3.1. SCCPS Path Space Model
 number field. It assumes that ∀l ∈ L, f(l, ·), and
 g(l, ·) are bounded and Lipschitz continuous; 3.1.1. Model Representation. To avoid the complexity of the
 dynamic evolution of SCCPS, SMC does not pay attention
 (vi) G: E ⟶ 2X is to assign a guardian condition to
 to the structure of SCCPS, but focus on sampling the
 each discrete transition, satisfying the following
 execution path of SCCPS. The behavior of SCCPS evolving
 conditions:
 over time can be characterized by the path of the system.
 ∗∗
 ∀e � (l, l′ ) ∈ E, G(e) denotes a measurable According to the execution semantics of SCCPS, the ex-
 subset of z Inv (l) ecution path generation process of SCCPS can be described
 ∗∗
 ∀l ∈ L, G(e): e � (l, l′ ) ∈ E, l′ ∈ L is a dis- as follows: in the current control mode li , the continuous
 joint subset of z Inv (l) variable xi evolves according to the SDE. When the evo-
 lution of xi satisfies the guardian condition (xi ∈ G(li , li+1 )),
 (vii) R: E × X ⟶ P(X) is a reset mapping. P(X)
 it migrates to the next control mode li+1 and the initial value
 represents a set of probability measures defined on
 of xi+1 is determined by the random reset kernel R. The
 X, and continuous variables are reset according to
 residence time of li is ti � inf t ∈ R>0 , xi (t) ∉ Inv(li ) . ti is a
 the probability distribution.
 random variable, and its value depends on the SDE of li and
 According to the definition, the SCCPS hybrid state the initial values xi (0) and Inv (li ). According to the
space is L × X, and (l, x) ∈ L × X represents the hybrid state. generation process of the SCCPS execution path, the next
The continuous dynamics of SCCPS evolves according to the state of SCCPS depends on the current state and the related
SDE in the current control mode. However, the discrete residence time of the current state. Therefore, the execution
dynamics refers to migrating one control mode to another path of the SCCPS can be regarded as that it is generated in
control mode with the guardian condition on the discrete the continuous-time Markov process in the hybrid state
transition, when the continuous variable cannot reach the space. As the residence time of li is longer, the probability of
boundary of the invariant. migration from li is higher. It can further presume that the
 Let xl (t) be the SDE solution of the initial state xl (0); residence time of li obeys the exponential distribution, and
τ(l) � inf t ∈ R>0 , xl (t) ∉ Inv(l) means that, in the control the continuous-time Markov process then becomes CTMC.
mode l, the first time that the evolution of a continuous Let Gl denote the guard condition set of all edges starting
variable violates the invariant, that is, the first time of exiting from l:
the control mode l. Gl � G(e): e � l, l′ ∈ E, l′ ∈ Loc , (4)
 SCCPS execution semantics: a random execution of where G(e) ∈z Inv (l) and G(ei ) ∩ G(ej ) � ∅, i ≠ j. In l, the
SCCPS is defined as a random process (l(t), x(t)) ∈ L × X in time for the continuous variable evolving to satisfying the
the SCCPS state space. If there is a stop-time sequence T0 � conditions of each guard is τ 1 , τ 2 , . . . , τ |Gl |. Then, the resi-
0 < T1 < T2 < · · · that makes ∀k ∈ N, where dence time in l is tl � min τ 1 , τ 2 , . . . , τ |Gl | . Supposing
 (i) (l0 , x0 ) ∈ L × X indicates the initial state of SCCPS. τ 1 , τ 2 , . . . , τ |Gl |, respectively, obey the exponential distribu-
 (ii) t ∈ (Tk , Tk+1 ), l(t) � l(Tk ) is a const, and x(t) is a tion of parameters λl,l′ , l′ ∈ L, (l, l′ ) ∈ E , then the resi-
 continuous solution of the SDE dence time tl in l obeys the exponential distribution of
 dx (t) � f(l(Tk ), x(t))dt + g(l(Tk ), x(t))dBt ; parameters l′ ∈Loc,(l,l′ )∈E λl,l′ . With this assumption, the ex-
 • Tk+1 � Tk + τ(l(Tk )); ecution path of SCCPS can be generated by the CTMC
 random process.
 • the probability distribution of x(Tk+1 ) is determined
 by the reset map R(ek , x(T−k+1 )), where
 ek � (l(Tk ), l(Tk+1 )) ∈ E and x(T−k+1 ) � limt⟶ Definition 1. SCCPS path generation model: the path
 Tk+1x(t). generation model on the SCCPS state space is defined as
 CTMC � (S, s0 , λ), where
 SCCPS path: a SCCPS execution path is defined as an
infinite sequence σ � ((l0 , x0 ), t0 ), ((l1 , x1 ), t1 ), . . . from the (i) S � L represents the discrete state set of SCCPS
initial state (l0 , x0 ), where (li , xi ) ∈ L × X represents the • s0 ∈ L denotes the initial state of SCCPS
SCCPS state. ti ∈ R≥0 means the time that transitions the
 • Migration rate function λ: S × S ⟶ R≥0 , and all
state (li , xi ) to the next state (li+1 , xi+1 ).
 migration rate function values form the migration
 rate matrix λ
3. Our Approach It can be seen from this definition that when the
 CTMC structure is known, its behavior is controlled by
In this section, we present our proposed method with the the migration rate matrix λ, whose value comes from
SCCPS path space to construct a cross-entropy optimization SCCPS. The value of λ is estimated with the maximum
model and use an iterative learning method to obtain an likelihood method according to simulating the execution
optimal importance sampling distribution from the pa- of SCCPS to obtain the time samples of the state
rameterized distribution cluster of the path space. transition.
Security and Communication Networks 5

3.1.2. Algorithm of Learning Model Parameters. The rarity of 3.2. Method of Sampling Rare Attributes. In the path space of
the path does not necessarily imply that the conversion rate the high-safety SCCPS, it is difficult to obtain samples
between two adjacent discrete states is low, and the rarity of satisfying the rare attributes, which makes the SMC infea-
the safety attributes in the path space does not necessarily sible. To address this challenge, we propose a method for
imply that the optimal parameters in the parameter space are sampling the rare attributes. It uses the cross-entropy
rare. Based on this observation, this section introduces our method to learn an optimal-importance sample distribution
approach of leveraging the maximum likelihood estimation from the path space of the SCCPS. With this sample dis-
method to estimate the migration rate of two adjacent tribution, it is easy to obtain the samples that satisfy the rare
discrete states of SCCPS and obtain the migration rate attributes. Thus, the convergence of the SMC can be
matrix λ. With the simulation operation of each discrete accelerated. The importance sampling distribution is cor-
state of SCCPS, the discrete state is sampled to migrate to the rected by the likelihood ratio weighting to ensure that the
next discrete state time; we then use the maximum likeli- SMC verification result is unbiased.
hood estimation to obtain an estimate of λ.
 For the state si ∈ S, we simulate executing the SDE in the
running state si to obtain the migration time 3.2.1. Zero-Variance Importance Sampling Distribution.
tk (k � 1, . . . , N) samples of the adjacent state sj . Assuming The basic idea of the importance sampling method [33, 34] is
that the migration time between si and sj obeys the expo- to change the probability density distribution of random
nential distribution of the parameter λij , then the likelihood variables, so as to obtain the samples of extremely small
function of λij can be obtained: probability events with a higher probability. We now present
 N
 the SMC method based on the importance sampling. Let
 L λij � λij e− λij tk
 , (5) f(ω) be the true distribution of path ω, and let g(ω) be the
 k�1 importance sampling distribution, and g(ω) can obtain the
 samples of the extremely small probability events with a
and its log likelihood function is as follows: higher probability when g(ω) ≠ 0 and f(ω) ≠ 0. In the case
 N N of verifying the extremely small probability events, it is
 ln L λij � ln λij − λij tk . (6) difficult to sample from f(ω) to meet the requirements, but
 k�1 k�1 the importance sampling method is to sample from g(ω).
 The probability p � Ef [I(ω)] satisfying the system attribute
 We further take the derivative of λij with the log-
 can be described as
likelihood function and make it equal to 0, and its estimated
value can be resolved, λ ij � (1/N) N k�1 tk . With f(ω)
 p � Ef [I(ω)] � I(ω)f(ω)dω � I(ω) g(ω)dω
E(λ ij ) � (1/N) N
 k�1 E( ) � (1/λ ), it can be seen that the
 λ ij ij g(ω)
estimated value is an unbiased estimate of λij . The estimated
variance is � I(ω)W(ω)g(ω)dω � Eg [I(ω)W(ω)],
 N N
 1 ⎠ � 1 Var t � 1 ,
 Var λ ij � Var⎛
 ⎝ t ⎞ (9)
 N k�1 k N2 j�1
 k
 Nλ2ij
 where W(ω) � (f(ω)/g(ω)) is the likelihood ratio, and
 (7) g(ω) is for the importance sampling. We leverage the
 likelihood ratio to correct the weighting to ensure that the
but the estimated variance is biased, and the variance will be
 estimated value of p is unbiased. We then randomly sample
decreased as the samples increase.
 In most cases, it is difficult to obtain a clear expression N independent execution paths ωi , i ∈ {1, . . . , N} from the
for the random execution of SCCPS. However, what the importance distribution g(ω) and obtain the unbiased
safety concerned is the accessibility analysis of discrete estimate:
states. The discrete state set S and its transitions can capture 1 N
all necessary information. Therefore, we derive the DTMC �
 p I ωi W ωi , (10)
 N i�1
from the SCCPS path generation model to represent the path
space of SCCPS. The value of DTMC’s migration probability and estimated variance
matrix P: S × S ⟶ [0, 1] can be obtained from the mi-
gration rate matrix λ of the SCCPS path generation model. 1 2 2 2
 ] �
 Varg [p E I (ω)W (ω) − p , (11)
For two states si and sj ∈ S, N g

 λij for p, respectively.
 ⎧
 ⎪
 ⎪
 ⎪
 ⎪ , s i ≠ sj , The efficiency and accuracy of importance sampling rely
 ⎨ λi
 P s i , sj � ⎪ (8) on the selection of the distribution g(ω). If the selection is
 ⎪
 ⎪ inadequate, the importance sampling method is difficult to
 ⎪
 ⎩ 1, s i � sj , effectively achieve the acceleration effect and may play a
 decelerating effect. The key problem of importance sampling
where λi � sj ∈Sλij . is to find a density function for the optimal sampling
6 Security and Communication Networks

probability to minimize the estimated variance. With for- the second term. Let D(λ) � Ω g∗ (ω)Inf(ω, λ)dω ; the
mula (10) returning 0, it can obtain the following formula: minimization problem of formula (13) is equivalent to the
 I(ω)f(ω) maximization problem of formula (14):
 g∗ (ω) � , (12)
 p maxλ g∗ (ω)ln f(ω, λ)dω � maxλ I(ω)f(ω)ln f(ω, λ)dω
 Ω Ω
where g∗ (ω) is a zero-variance importance sampling dis- � maxλ E[I(ω)ln f(ω, λ)].
tribution, which means that extracting only one sample from
the zero-variance importance sampling distribution can be (15)
used to calculate its estimated value, that is, any sample is an Solving the optimization problem of formula (14)
unbiased estimate of its mean. However, the zero-variance requires sampling from the true distribution f(ω).
importance sampling distribution depends on the true value However, in the case of rare attribute verification, it is
p, and the value of p is unknown. Therefore, it is impossible difficult to sample from f(ω) to the path sample that
to sample from g∗ (ω). This paper proposes to use the cross- satisfies the rare attribute. By using importance again, the
entropy method to find an approximate optimal importance sampling method samples from the distribution f(ω, μ)
sampling distribution closest to g∗ (ω) from the parame- and the selection of parameter μ should be able to in-
terized distribution family of the sample path space, so as to crease the probability of the path that meets the rare
reduce the SMC variance and accelerate the convergence of attribute. Therefore, the optimization problem of formula
the SMC algorithm. (14) can be re-formed as
 f(ω)
 maxλ I(ω) f(ω, μ)ln f(ω, λ)dω
3.2.2. Cross-Entropy Optimization Model. This section is to Ω f(ω, μ)
obtain the optimal importance sampling distribution by
minimizing the cross entropy between the two probability (16)
 � maxλ I(ω)W(ω, μ)f(ω, μ)ln f(ω, λ)dω .
distributions. According to the definition of cross entropy Ω
[35], this section provides the definition of cross entropy for
the SCCPS path space. � maxλ Eμ [I(ω)W(ω, μ)ln f(ω, λ)].

 Among them, the likelihood ratio function
Definition 2. Cross entropy for the SCCPS path space: the W(ω, μ) � (f(ω)/f(ω, μ)). In formula (16), the optimal
cross entropy between two probability measures f(ω) and solution of its optimization problem λ∗ can be estimated by
f′ (ω) for the SCCPS path space Ω is as follows: the path sample, and the sample mean is replaced by the
 f(ω) expectation Get the estimated value of λ∗
 CE f(ω), f′ (ω) � f(ω)ln d . (13)
 Ω f′ (ω) ω N
 1
 The cross entropy is used to assess the similarity of two λ ∗ � argmaxλ I ωi W ωi , μ ln f ωi , λ , (17)
 N i�1
probability distributions. The value of cross entropy is
smaller, and f(ω) and f′ (ω) are more similar, i.e., where ω1 , ω2 , . . . , ωN is a sample from the distribution
CE(f(ω), f′ (ω)) � 0 if and only if f(ω) � f′ (ω). f(ω, μ).
 According to Definition 2, the construction of the cross-
entropy optimization model on the SCCPS path space is
given below. Assume that the original distribution f(ω) of 3.3. Algorithm of Verifying the Cross-Entropy Safety. In
the SCCPS path ω comes from the parameterized distri- Section 3.1, we provide a DTMC-based method to ap-
bution family f(ω, θ) , The cross-entropy optimization proximate the SCCPS path space. SMC mainly considers
method is used to select a distribution f(ω, λ∗ ), λ∗ ∈ θ in the system execution path ω � s0 , s1 , . . . , sk (k > 0) within a
the parameterized distribution family, λ∗ ∈ θ and the op- bounded time T, where k is a random variable to rep-
timal distribution g∗ (ω) have the smallest cross-entropy. resent the number of state transitions, and its value varies
This optimization problem can be described for with ω. Let ⟨l, m⟩ denote two adjacent and ordered state
 g∗ (ω) pairs in ω, S(ω) represent the set of ordered state pairs in
 minλ CE g∗ (ω), f(ω, λ) � minλ g∗ (ω)ln d ω, n(ω)
 lm represent the number of transitions from state l to
 Ω f(ω, λ) ω state m in ω, and n(ω) represent the number of occur-
 l
 rences of the state l in ω; then, the probability measure
 � minλ g∗ (ω)ln g∗ (ω)dω function of path ω under system parameter p can be
 Ω
 formulated as
 − g∗ (ω)ln f(ω, λ)dω . n(ω)
 Ω f(ω, p) � ιinit s0 plm lm . (18)
 (14) ⟨l,m⟩∈S[ω]

 The first term of formula (13) has nothing to do with λ Substituting f(ωi , λ) of formulas (16) with (17), we
and minimizing cross entropy is equivalent to maximizing obtain
Security and Communication Networks 7

 1 N ⎜ (ω ) ⎟
 maxp I ωi W ωi , μ ⎛
 ⎜
 ⎝lntinit s0 + nlm i ln plm ⎞
 ⎟
 ⎠s.t. plm � 1, (19)
 N i�1 m∈S
 ⟨l,m⟩∈S(ωi )

and formula (18) can be transformed by the Lagrangian
multiplier method into the following optimization problem:

 N
 ⎜ (ω ) ⎟
 maxp I ωi W ωi , μ ⎛
 ⎜
 ⎝ln ιinit s0 + nlm i ln plm ⎞
 ⎟ ⎝ p − 1⎞
 ⎠ + ]i ⎛ lm
 ⎠, (20)
 i�1 ⟨l,m⟩∈S(ωi ) m∈S

 (j)
 (j) (j) (j) ω 
where ]i is the Lagrangian multiplier. Taking the derivative (j+1) (j) N
 i�1 I ωi W ωi , p nlm
 i

 plm � αplm +(1 − α) (j)
 ,
of formula (19) to plm and making it equal to 0, the solution (j) (j) (j) ωi 
 N
 i�1 I ωi W ωi , p nl
can be
 (ω i ) α ∈ (0, 1).
 N
 i�1 I ωi W ωi , μ nlm
 plm � , (21) (23)
 (ω i )
 N
 i�1 I ωi W ωi , μ n l
 The smoothing strategy can retain important but not yet
where ωi (1 ≤ i ≤ N) is the sample path from the distribution effective parameters. Iterative formula (21) and smoothing
f(ω, μ), and f(ωi ) represents the true probability distri- formula (22) can jointly ensure that approximately uniform
bution of the SCCPS path. sampling is obtained from the path set of events satisfying
 With formula (20), it indicates that the estimated value the minimal probability.
of the optimal solution relies on the initial distribution The selected initial distribution f(·; p(0) ) should be able
f(ω, μ). However, the distribution of f(ω, μ) is generally to produce some paths that satisfy the event with minimal
far from the optimal distribution. Therefore, in order to probability in the first iteration, that is, the selected pa-
reduce the influence of the initial distribution f(ω, μ) on rameter p(0) should be able to increase the probability of
the optimal importance sampling distribution, this paper occurrence of the extremely small probability events.
proposes the iterative solution in the path space. Through Therefore, in this paper, we set the initial parameter p(0) to a
the iteration, the algorithm can explore a wider path uniform distribution, and the uniform distribution can
space, so as to obtain a better approximate optimal quickly obtain the sample path that satisfies the extremely
solution. small probability event. The condition for stopping the it-
 Let the initial distribution parameter be u � p(0) , and an eration can be that the coefficient of variance or the distance
iterative formula can be obtained from formula (20): between two iteration parameter vectors are not higher than
 a certain constant or the maximum number of iterations. For
 (j) (j) (j) ω
 (j)
 example, given any small positive number ϵ > 0, if ‖p(j) −
 (j+1) N
 i�1 I ωi W ωi , p nlm
 i

 plm � , (22) p(j − 1)‖ < ϵ is satisfied, the iteration will be stopped. To
 (j)
 (j) (j) ω facilitate the comparison, we limit the maximum number of
 N
 i�1 I ωi W ωi , p(j) nl i
 iterations in the experiment. To sum up, Algorithm 1
where N is the number of samples per iteration, presents the description of the importance sampling dis-
 (j) (j) (j)
W(ωi , p(j) ) � (f(ωi )/f(ωi , p(j) )) represents the like- tribution learning algorithm, which iteratively solves the
 (j)
lihood ratio of the nth iteration, and ωi is the ith sample approximate optimal importance sampling distribution in
 (j) the SCCPS path space of the attributes for being verified.
path sampled from the distribution f(ωi , p(j) ).
 Usually, only a few state transitions can be seen in each Regardless of sample acquisition time and BLTL model
simulated execution. During each iteration, some param- checking time, the time complexity of Algorithm 1 is
eters do not work in the path that satisfies the extremely O(jmax |p|N). Since the optimized objective function is
small probability event. Formula (21) will set these pa- convex, there is a unique optimal solution. If Algorithm 1
rameter values to zero so that these parameters will not can converge, it must converge to the vicinity of the unique
work in all subsequent iterations. As a result, the iterative optimal solution [36]. Since the number of samples in each
algorithm converges too prematurely to detect a wider iteration is limited, the convergence is probabilistic but not
parameter space. To avoid this situation, this paper adopts a necessarily monotonic. By simply limiting the maximum
smoothing strategy to temporarily reduce the importance number of iterations jmax , the algorithm can be guaranteed
of inoperative parameters in the iteration instead of simply to be terminated with 100% probability. For the proof of
setting them to zero. The smoothing strategy is to weight convergence of cross-entropy optimization, please refer to
current iteration value and the parameters of the previous [37]; thus, a formal proof of convergence is not provided in
iteration: this paper. In experiments, we observe that the parameters
8 Security and Communication Networks

are convergent. Once the parameters converge, the last set of Aeronautics and Space Administration [39]. The two hor-
 that
simulated samples is used to estimate the probability p izontal tails on the two side of the aircraft’s fuselage are
SCCPS satisfies the safety attribute with the optimal im- controlled by two elevators, respectively. Each elevator has
portance sampling distribution. Algorithm 2 describes the two independent hydraulic actuators. In the normal oper-
verification process of the safety verification algorithm. ation process, each elevator is positioned by its corre-
 sponding external actuator, and its internal actuator can be
 used when the external actuator does not work. The two
4. Experiment and Analysis external actuators are driven by two independent hydraulic
To evaluate the effectiveness and performance of the Cross- circuits, and the two internal actuators are both connected to
Entropy Safety Verification Algorithm (CESVA) method the third hydraulic circuit. The system should ensure that
proposed in this paper, we apply CESVA to a fault-tolerant only one set of actuators (i.e., external or internal) locates the
controller for an aircraft elevator system (FTC4AE), that is, a elevator at any given time. If the external actuator or its
Stateflow/Simulink hybrid system modeling case from corresponding hydraulic circuit fails, the system will activate
MATLAB. It introduces the randomness in terms of the fault the internal actuator. If the fault still exists, the external
injection and simulates with MATLAB to obtain the system actuator will be shut down and eventually isolated. The fault
execution path. Path checking is realized by the BLTL model in the hydraulic circuit may be temporary, and if the fault is
detector of Plasma-Lab [38]. In the experiment, the rare cleared, the hydraulic circuit can always be restored to the
attributes of FTC4AE is verified with the CESVA method, online state. The control logic of the system is implemented
which is further compared with the Heuristic Importance in the form of a state flow diagram, while the hydraulic
Sampling (HIS) method [17]. actuators and elevators are modeled by using Simulink.
 According to modifying the Stateflow/Simulink model,
 we add random faults into three hydraulic circuits. Setting
4.1. Validity Measurement of Experimental Results. In the the fault model with an out-of-bounds’ reading of circuit
case of nonrare attribute verification, the confidence interval pressure, we model the fault injection as three independent
is used to assess the accuracy of various methods, while in Poisson processes. When the hydraulic circuit fails, the
the case of rare attribute verification, the relative error of circuit will stay in the fault state for one second. Then, the
sampling is used to assess the accuracy of the estimation: pressure reading will restore to its normal value, and the
 fault state will be terminated. In our experiments, the being
 ������ ���
 ]
 Var[p 1 estimated safety attribute is the probability that, within 25
 ) �
 RE(p ≈ , (24) seconds, the horizontal tails will not respond to the control
 ]
 E[p Np
 inputs in the duration of 1 second.
where E[p ] is replaced by the current estimated value p , We estimated the probability of the BLTL formula φ:
Var[p ] � (1/N − 1) N i�1 (I(σ i )W(σ i , μ, λ ∗
 ) − 
 p ) 2
 .
 Skewness is a measure of assessing the skewing direction φ � F25 G1 H1 fail ∨ H3 fail ∧ H2 fail , (26)
and degree of data distribution and is the characteristic
number that characterizes the degree of asymmetry of the where H1 and H3 represent the hydraulic circuit that drives
probability distribution density curve with respect to the the external actuator, while H2 represents the hydraulic
average. Skewness is defined as the third-order standardized circuit that drives the internal actuator.
moment of the sample, and the skewness of the normal In the experiment, the failure rate of the three hydraulic
distribution is 0, and its estimator is evenly distributed circuits is set to 0.001, and the failure repair rate is 1. With
around the mean: the two parameters, the parameter v in Algorithm 1 can be
 calculated. It still is difficult to obtain samples that satisfy the
 3
 N N N
 
 i�1 p − (1/N) j�1 pj attribute φ with the previous parameters. Therefore, to
 ) �
 skew(p (3/2)
 . ensure that the obtained samples can satisfy the attribute φ,
 (N − 1)(N − 2) (Var[p ])
 the initial failure rate is set as 0.1 and the fault repair rate is
 (25) set as 1. According to these two parameters, the initial
 The negative skewness means that the distribution is left- parameter of iteration p(0) in Algorithm 1 can be calculated.
tailed. At this time, the data on the left of the mean are less In order to assess the performance of verifying the rare
than the data on the right. Intuitively, the tail on the left is attributes with the CESVA method, 20 iterations of Algo-
longer than the tail on the right. In contrast, the positive rithm 1 are performed. In each iteration, the number of
skewness means that the distribution is right-tailed. The data samples is N � 104, the smoothing factor α � 0.2, and the
on the right of the mean is less than the left. Intuitively, the total number of required samples is 2.0 × 105 .
tail on the right is longer than the tail on the left. Figure 1 shows the change trend of the failure rate
 parameters during the 20 iterations of the CESVA method.
 At the beginning of the iteration, the parameters converge
4.2. Experiment and Analysis on a Fault-Tolerant Controller rapidly. When the parameters are close to their optimal
for the Aircraft Elevator System. The fault-tolerant controller values, the convergences of their values slow down with
for an aircraft elevator system is a part of a large Simulink random fluctuations. From the 16th iteration, the failure rate
model of HL-20 rescuers developed by the National parameters start to converge to the stable values. From the
Security and Communication Networks 9

6 10–10
5

4 10–11
3

2 10–12
1

0
 10–13
 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
 λ1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
 λ2
 λ3 Figure 2: Distribution of estimated values of CESVA during 20
 iterations.
 Figure 1: Convergence of parameters during 20 iterations.

perspective of the parameter convergence trend, it seems 1.0
that the value of the failure rate parameter increases with the
increasing iteration times. It indicates that the proportion of
sampling the paths satisfying the rare attribute is gradually 0.1
increasing.
 Figure 2 illustrates the distribution of the estimated
values of the CESVA method during the iterations. The 0.01
estimated value gradually converges from the 17th iteration.
Figure 3 presents the distribution of the relative error of the
CESVA method during the iterations. The relative error 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
gradually converges from the 16th iteration. Finally, the
 Figure 3: Distribution of relative error of CESVA during 20
probability estimated value of the security attribute φ is iterations.
1.682 × 10− 12 , and the value of the relative error is 0.01.
 In order to verify the statistical performance of the
CESVA method, 100 experiments were carried out under the the Stateflow/Simulink model, Clarke and Zuliani [24]
above parameters, and 2.0 × 105 samples were used in each proposed the SMC method of cross-entropy minimization
experiment. Compared with the performance of the HIS importance sampling to verify its safety properties.
method under the same sample size, Table 1 shows the mean, Zuliani et al. [17] further used the SMC method in paper
skewness, and statistical indicators such as standard devi- [24] to verify the safety properties of a class of discrete-
ation (likelihood ratio standard deviation), relative error, time SHS. The method proposed by Clarke and Zuliani
and sample size for each experiment. As presented in Ta- [24] assumes that the distribution of the system path space
ble 1, with the same sample size, the estimated values of the is exponential distribution. By simply increasing the
CESVA method are more closely distributed around the failure rate of the system parameters and calculating the
mean value, and the likelihood is over 10 times less than the optimal parameters of the exponential distribution with
standard deviation and relative error, when comparing the paths satisfying the rare attributes extracted at one
against the HIS method. Although the true probability is time, an importance sampling distribution can be ob-
unknown, statistical indicators such as the standard devi- tained. J´egourel et al. [26] used a random guardian
ation, skewness, and relative error of the likelihood ratio command to the importance sampling distribution. This
illustrate that the true probability and the mean are very model can approximate the path distribution of the system
close. by increasing the number of commands (the number of
 parameters) and uses the minimized cross-entropy
5. Related Work method to obtain an importance sampling distribution in
 the random model. However, the optimal importance
The verification of the rare attribute for SMC mainly in- sampling distribution obtained by the above method does
cludes the importance sampling method, the importance not come from the distribution family of the system path
splitting method, and the statistical learning method. space, and these methods actually belong to the heuristic
 The importance sampling method is an effective importance sampling method.
method to solve the verification of rare attributes. For the The importance segmentation method [34] is a method
CTMC and DTMC random models, Reijsbergen et al. [40] of reducing the estimated variance. Based on the importance
and Barbot et al. [23] leveraged the heuristic methods to segmentation method, J´egourel et al. [33] proposed the
obtain an importance sampling distribution to complete SMC algorithm for the verification of small probability
the attribute verification of the two types of models. For events. The key idea is to decompose the system logic
10 Security and Communication Networks

 Input: N, the number of samples per iteration.
 Input: v, the true path distribution parameter of SCCPS.
 Input: p(0) , the initialization parameter.
 Input: jmax , the maximum number of iterations.
 Output: p∗ Optimal parameters.
 (1) Function learningAlg (N, v, p(0) jmax )
 (2) j � 0;
 (3) while j < jmax do
 (4) A � 0, B � 0, i � 1
 (5) while i ≤ N do
 (6) generate a path ωi according to the pdf f(., p(j) )
 (7) if ωi ⊨φ then (ωi )
 (8) Wi � ⟨l,m⟩∈S(ωi )(vlm /plm )nlm ;
 (ω )
 (9) A � A + Wi nlm i ;
 (ω )
 (10) B � B + Wi nl i ;
 (11) i � i + 1;
 (j+1) (j)
 (12) plm � αplm + (1 − α)(A/B);
 (13) j�j+1
 (14) return p(j− 1)

 ALGORITHM 1: Importance sampling distribution learning algorithm.

 Input: NI S, The number of samples.
 Input: v, the true path distribution parameter of SCCPS.
 Input: p∗ , the optimal parameters calculated by Algorithm 1.
 Output: p , Probability of SCCPS meeting safety attributes.
 (1) Function verifyingAlg (N, v, p(0) jmax )
 (2) A � 0, i � 1
 (3) while i ≤ N do
 (4) generate a path ωi according to the pdf f(., p(j) )
 (5) if ωi ⊨φ then (ωi )
 (6) Wi � ⟨l,m⟩∈S(ωi )(vlm /plm )nlm :
 (7) A � A + Wi ;
 (8) i�i+1
 (9) return (A/NIS )

 ALGORITHM 2: Safety verification algorithm.

Table 1: Comparison of statistical performance between CESVA Applying statistical learning methods to SMC is also an
and HIS. important research direction. Du et al. [19] proposed a
 learning SMC framework based on support vector machine-
 Standard
Algorithm Mean Skewness
 deviation
 Relative error based two classifiers. It uses cost-sensitive and resampling
 12 − 14 methods to solve the unbalanced data learning problem of
CESVA 1.687×10− 0.029 1.853×10 0.011
 12 support vector machines and implements predicting and
HIS 1.986×10− 1.264 2.654×10− 13 0.133
 assessing the probability of occurrence of small-probability
 events with a relatively small number of samples. However,
attributes into embedded attributes, which makes its this method cannot obtain rare attribute samples. For the
probability easier to be estimated and reduces the number of low-probability attributes of hardware circuits with multiple
sample paths required by verification. To improve the failure regions, Kumar et al. [41] assumed that the system
performance, the attributes need to be decomposed into failure distribution is a Gaussian mixture model, thus
multiple levels with different probabilities. During the de- proposed to use the variational Bayes method to learn an
composition process, copying or eliminating paths depend optimal importance sampling distribution from the
on their intermediate behavior. When the decomposition is Gaussian mixture model. However, the optimal importance
over, an estimated probability that the attribute is satisfied sampling distribution is not a distribution family from the
can be obtained. The importance segmentation method is system path space. Kalajdzic et al. [42] proposed an SMC
essentially heuristic and depends on the model, but lacks the method based on the principle of feedback control. This
support of theoretical results. method learns a model of a cyber-physical fusion system by
Security and Communication Networks 11

using importance sampling to estimate the system state and Ministry of Industry and Information Technology Research
importance division to control the system. So it can infer the Project (NJ2019006).
probability that the system satisfies the given attributes.
 The method proposed in this paper starts from the
SCCPS path probability space, constructs a cross-entropy
 References
optimization model, and uses an iterative learning method [1] N. A. Tanner, J. R. Wait, C. R. Farrar, and H. Sohn, “Structural
to obtain an optimal importance sampling distribution from health monitoring using modular wireless sensors,” Journal of
the parameterized distribution clusters of the path space. It Intelligent Material Systems and Structures, vol. 14, no. 1,
ensures that the optimal importance sampling distribution pp. 43–56, 2003.
can come from the distribution family in the path probability [2] S. K. Kampf, M. Salazar, and S. W. Tyler, “Preliminary in-
space of SCCPS. And, the iterative learning method ensures vestigations of effluent drainage from mining heap leach
that the distribution can evenly cover the unsafe path dis- facilities,” Vadose Zone Journal, vol. 1, no. 1, pp. 186–196,
tribution area. Therefore, the accuracy and efficiency of the 2002.
rare attribute verification can be improved significantly. [3] G. Chunpeng, Z. Liu, J. Xia, and F. Liming, “Revocable
 identitybased broadcast proxy re-encryption for data sharing
 in clouds,” IEEE Transactions on Dependable and Secure
6. Conclusion Computing, vol. 99, 2019.
SMC has been successfully applied to SCCPS safety attri- [4] L. Yu and J.-p. Wang, “Review of the current and future
 technologies for video compression,” Journal of Zhejiang
bute verification and has become the most effective solu-
 University Science C, vol. 11, no. 1, pp. 1–13, 2010.
tion, but rare attribute verification is still a challenge for
 [5] H.-h. Xu and J. Zhu, “Aniterative approach to Bayes risk
SMC. To be able to extract samples satisfying the rare decoding and system combination,” Journal of Zhejiang
attributes from SCCPS, CTMC is used to construct the University SCIENCE C, vol. 12, no. 3, pp. 204–212, 2011.
probability space model of the execution path of SCCPS [6] O. Déniz, M. Castrillón, J. Lorenzo, L. Antón, M. Hernandez,
given with the probability measure of the random execu- and G. Bueno, “Computer vision based eyewear selector,”
tion path as well as the parameterized probability distri- Journal of Zhejiang University Science C, vol. 11, no. 2,
bution function family, to construct the cross-entropy pp. 79–91, 2010.
iterative model. According to the iteratively learning from [7] D. Theodoridis, Y. Boutalis, and M. Christodoulou, “Direct
finding the approximate optimal importance sampling adaptive regulation of unknownnonlinear systems with
distribution in the SCCPS path probability space, the ef- analysis of themodel order problem,” Journal of Zhejiang
ficient sampling of rare attribute samples in SCCPS is University Science C, vol. 12, no. 1, pp. 1–16, 2011.
achieved. With the evaluating experiments, the experi- [8] X.-c. Zhou, H.-b. Shen, and J.-p. Ye, “Integrating outlier
mental results show that, for the verification of rare at- filtering in large margin training,” Journal of Zhejiang Uni-
tributes, comparing against the heuristic importance versity Science C, vol. 12, no. 5, pp. 362–370, 2011.
sampling method with the same number of samples, the [9] I. Prigogine, Order through Fluctuation: Self-Organization and
estimated value of our method is better distributed around Social System, pp. 93–134, Addison-Wesley, London, UK,
 1976.
the mean, and the standard deviation and relative error are
 [10] C. Ge, W. Susilo, Z. Liu, J. Xia, P. Szalachowski, and F. Liming,
reduced by more than an order of magnitude. Based on the
 “Secure keyword search and data sharing mechanism for
method proposed in this paper, combining with the current cloud computing,” IEEE Transactions on Dependable and
mainstream SMC method to develop an adaptive SMC tool Secure Computing, vol. 5, 2020.
is set as the future work. [11] Z. Wu, Y. An, Z. Wang et al., “Study on zoelite enhanced
 contact-adsorption regeneration-stabilization process for
Data Availability nitrogen removal,” Journal of Hazardous Materials, vol 156,
 2008 in press.
The data used to support the findings of this study are [12] H. L. S. Younes, “Error control for probabilistic model
available from the corresponding author upon request. The checking,” in Lecture Notes in Computer Science,
authors apply CESVA to a fault-tolerant controller for an E. A. Emerson and K. S. Namjoshi, Eds., pp. 142–156,
aircraft elevator system (FTC4AE) that is a State-flow/ Springer, Berlin, Germany, 2006.
Simulink hybrid system modeling case from MATLAB. [13] K. G. Larsen, “Statistical model checking, refinement
 checking, optimization, . . . for stochastic hybrid systems,” in
Conflicts of Interest Lecture Notes in Computer Science, pp. 7–10, Springer, Berlin,
 Germany, 2012.
The authors declare that they have no conflicts of interest. [14] Q. Wang, P. Zuliani, S. Kong, S. Gao, E. M. Clarke, and
 “ SReach, “SReach: a probabilistic bounded delta-reachability
Acknowledgments analyzer for stochastic hybrid systems,” Computational
 Methods in Systems Biology, vol. 9308, pp. 15–27, 2015.
This work was supported by the National Key Research and [15] S. Gorini, M. Quirini, A. Menciassi, G. Permorio, C. Stefanini,
Development Program of China (no.2018YFB1003900), and P. Dario, “A novel sma-based actuator for a legged en-
National Natural Science Foundation of China (no. doscopic capsule,” in First IEEE/RAS-EMBS International
61772270), Key Laboratory of Safety-Critical Software Conference on Biomedical Robotics and Biomechatronics,
(Nanjing University of Aeronautics and Astronautics), and pp. 443–449, Pisa, Italy, February 2006.
12 Security and Communication Networks

[16] U. Rizvi, Combined Multiple Transmit Antennas and Multi- checking,” in Lecture Notes in Computer Science, pp. 143–159,
 Level Modulation Techniques, Stockholm, Sweden, Europe, in Springer, Berlin, Germany, 2014.
 Swedish, 2006. [34] G. Jiang and M. C. Fu, “Importance splitting for finite-time
[17] P. Zuliani, C. Baier, and E. M. Clarke, “Rare-event verification rare event simulation,” IEEE Transactions on Automatic
 for stochastic hybrid systems,,” in Proceedings of the ACM Control, vol. 63, no. 6, pp. 1670–1677, 2018.
 International Conference on Hybrid Systems: Computation & [35] D. P. Kroese, T. Taimre, and Z. I. Botev, Handbook of monte
 Control, pp. 217–226, ACM, Quebec, Canada, April 2012. carlo methods, John Wiley & Sons, Hoboken, NJ, USA, 2013.
[18] P. Zuliani, A. Platzer, and E. M. Clarke, “Bayesian statistical [36] P.-T. de Boer, D. P. Kroese, S. Mannor, and R. Y. Rubinstein,
 model checking with application to stateflow/simulink veri- “A tutorial on the cross-entropy method,” Annals of Opera-
 fication,” Formal Methods in System Design, vol. 43, no. 2, tions Research, vol. 134, no. 1, pp. 19–67, 2005.
 pp. 338–367, 2013. [37] A. Costa, O. D. Jones, and D. Kroese, “Convergence properties
[19] D. Du, B. Cheng, and J. Liu, “Statistical model checking for of the cross-entropy method for discrete optimization,”
 rare-event in safety-critical system,” Journal of Software in Operations Research Letters, vol. 35, no. 5, pp. 573–580, 2007.
 Chinese, vol. 26, no. 2, pp. 305–320, 2015. [38] B. Boyer, K. Corre, A. Legay, and S. Sedwards, “PLASMA-lab:
[20] L. Sweeney, Uniqueness of simple demographics in the U.S. a flexible, distributable statistical model checking library,” in
 population, Technical Report No. LIDAP-WP4, Carnegie Proceedings of the 10th International Conference on Quanti-
 Mellon University, Pittsburgh, PA, USA, 2000. tative Evaluation of Systems, pp. 160–164, Buenos Aires,
[21] ISO, “Steels-classification-part 1: classification of steels into Argentina, August 2013.
 unalloyed and alloy steels based on chemical composition,” [39] M. V. Stringfellow, N. G. Leveson, and B. D. Owens, “Safety-
 Technical Report ISO 4948-1, ISO, Geneva, Switzerland, 1982. driven design for software-intensive aerospace and automo-
[22] D. Reijsbergen, P. de Boer, W. R. W. Scheinhardt, and tive systems,” Proceedings of the IEEE, vol. 98, no. 4,
 B. R. Haverkort, “Rare event simulation for highly dependable pp. 515–525, 2010.
 systems with fast repairs,” in Proceedings of the Seventh In- [40] D. Reijsbergen, P. de Boer, W. R. W. Scheinhardt, and
 ternational Conference on the Quantitative Evaluation of B. R. Haverkort, “Rare event simulation for highly dependable
 Systems, pp. 251–260, IEEE, Williamsburg, VA, USA, Sep- systems with fast repairs,” Perform. Evaluation, vol. 69, no. 7-
 tember 2010. 8, pp. 336–355, 2012.
[23] B. Barbot, S. Haddad, and C. Picaronny, “Coupling and [41] J. A. Kumar, S. N. Ahmadyan, and S. Vasudevan, “Efficient
 importance sampling for statistical model checking,” Tools statistical model checking of hardware circuits with multiple
 and Algorithms for the Construction and Analysis of Systems, failure regions,” IEEE Transactions on Computer-Aided Design
 vol. 7214, pp. 331–346, 2012. of Integrated Circuits and Systems, vol. 33, no. 6, pp. 945–958,
[24] E. M. Clarke and P. Zuliani, “Statistical model checking for 2014.
 cyber-physical systems,” Automated Technology for Verifica- [42] K. Kalajdzic, C. J´egourel, A. Lukina et al., “Feedback control
 tion and Analysis, vol. 6996, pp. 1–12, 2011. for statistical model checking of cyber-physical systems,” in
[25] University, Citing Electronic Sources of Information, Uni- Proceedings of the leveraging applications of FormalMethods,
 versity of Sheffield Library, Howard, UK, 2001, http://www. verification and Validation: foundational techniques - 7th
 shef.ac.uk/library/libdocs/hsl-dvc1.pdf. international Symposium, ISoLA 2016, Imperial, Corfu,
[26] C. J´egourel, A. Legay, and S. Sedwards, “Command-based Greece, October 2016.
 importance sampling for statistical model checking,” Theo-
 retical Computer Science, vol. 649, pp. 1–24, 2016.
[27] H. L. S. Younes and R. G. Simmons, “Statistical probabilistic
 model checking with a focus on time-bounded properties,”
 Information and Computation, vol. 204, no. 9, pp. 1368–1409,
 2006.
[28] T. H´erault, R. Lassaigne, F. Magniette, and S. Peyronnet,
 “Approximate probabilistic model checking,” in Lecture Notes
 in Computer Science, pp. 73–84, Springer, Berlin, Germany,
 2004.
[29] Y. J. Kim, M. Kim, and T. Kim, “Statistical moHaifa, Israeldel
 checking for safety critical hybrid systems: an empirical
 evaluation,” in proceedings of the 8th international haifa
 verification conference on hardware and software: verification
 and testing, pp. 162–177, Haifa, Israel, November 2012.
[30] G. Agha and K. Palmskog, “A survey of statistical model
 checking,” ACM Transactions on Modeling and Computer
 Simulation, vol. 28, no. 1–6, pp. 6–39, 2018.
[31] A. Legay and M. Viswanathan, “Statistical model checking:
 challenges and perspectives,” International Journal on Soft-
 ware Tools for Technology Transfer, vol. 17, no. 4, pp. 369–376,
 2015.
[32] J. Hu, J. Lygeros, and S. Sastry, “Towards a theory of stochastic
 hybrid systems,” Hybrid Systems: Computation and Control,
 vol. 337, pp. 160–173, 2000.
[33] C. J´egourel, A. Legay, and S. Sedwards, “An effective heuristic
 for adaptive importance splitting in statistical model
You can also read