A hybrid approach to cyber-physical systems verification

Pratyush Kumar, Dip Goswami, Samarjit Chakraborty, Anuradha M. Annaswamy, Kai Lampka, Lothar Thiele

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

57 Citations (Scopus)


We propose a performance verification technique for cyber-physical systems that consist of multiple control loops implemented on a distributed architecture. The architectures we consider are fairly generic and arise in domains such as automotive and industrial automation; they are multiple processors or electronic control units (ECUs) communicating over buses like FlexRay and CAN. Current practice involves analyzing the architecture to estimate worst-case end-to-end message delays and using these delays to design the control applications. This involves a significant amount of pessimism since the worst-case delays often occur very rarely. We show how to combine functional analysis techniques with model checking in order to derive a delay-frequency interface that quantifies the interleavings between messages with worst-case delays and those with smaller delays. In other words, we bound the frequency with which control messages might suffer the worst-case delay. We show that such a delay-frequency interface enables us to verify much tigher control performance properties compared to what would be possible with only worst-case delay bounds.
Original languageEnglish
Title of host publicationDAC Design Automation Conference 2012
Place of PublicationPiscataway
PublisherInstitute of Electrical and Electronics Engineers
Number of pages9
ISBN (Electronic)978-1-4503-1199-1
ISBN (Print)978-1-4503-1199-1
Publication statusPublished - 2012
Externally publishedYes
EventDAC Design Automation Conference 2012 - San Francisco, United States
Duration: 3 Jun 20127 Jun 2012


ConferenceDAC Design Automation Conference 2012
Country/TerritoryUnited States
CitySan Francisco
OtherDAC 2012


Dive into the research topics of 'A hybrid approach to cyber-physical systems verification'. Together they form a unique fingerprint.

Cite this