2019 Formal Methods in Computer Aided Design (FMCAD) 2019
DOI: 10.23919/fmcad.2019.8894264
|View full text |Cite
|
Sign up to set email alerts
|

Shield Synthesis for Real: Enforcing Safety in Cyber-Physical Systems

Abstract: Cyber-physical systems are often safety-critical in that violations of safety properties may lead to catastrophes. We propose a method to enforce the safety of systems with real-valued signals by synthesizing a runtime enforcer called the shield. Whenever the system violates a property, the shield, composed with the system, makes correction instantaneously to ensure that no erroneous output is generated by the combined system. While techniques for synthesizing Boolean shields are well understood, they do not h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
18
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(18 citation statements)
references
References 42 publications
0
18
0
Order By: Relevance
“…Shields are usually constructed offline by computing a maximally permissive policy containing all actions that will not violate the safety specification. Several extensions exist [4,6,29,39]. The shielding approach has been shown to be successful in combination with RL [2,21].…”
Section: Related Workmentioning
confidence: 99%
“…Shields are usually constructed offline by computing a maximally permissive policy containing all actions that will not violate the safety specification. Several extensions exist [4,6,29,39]. The shielding approach has been shown to be successful in combination with RL [2,21].…”
Section: Related Workmentioning
confidence: 99%
“…Several formally based runtime enforcement approaches have been proposed [16]- [19], which are not suitable for autonomous systems as they are reactive in nature. Our work is related to the class of runtime enforcement techniques that are suitable for reactive systems [12], [20], [21]. These rely on low-overhead wrappers, which mediate between the environment and the controller of a reactive system, to ensure that the system operates safely at all times by ensuring that all user specified policies hold.…”
Section: Related Workmentioning
confidence: 99%
“…Run-time Monitoring and Anomaly Detection in CPS: Recent works on run-time safety monitoring in CPS focus on control invariant methods [86], dynamic invariant detection [20], application-dependent multi-level monitoring [87], unsupervised anomaly detection from streaming data [88], [89], and run-time safety guards that satisfy a predefined set of safety properties [90], [91].…”
Section: Related Workmentioning
confidence: 99%