Date Topic Readings Slides/Summaries Lead
8/21 Course Introduction, General Introduction -- Course Intro, CPS Verification Intro Jyo
8/28 Software Verification A1. Ranjit Jhala, Rupak Majumdar: Software model checking. ACM Comput. Surv. 41(4): 21:1-21:54 (2009) A1 summary P: Anand, Zunchen S: Xin, Minyang
9/4

Invited Talk by Yash Vardhan Pant from UPenn

-- Talk summary ** --
9/11 Hybrid Systems Reachability A2. X. Chen, E. Abraham, S. Sankaranarayanan: Taylor model Flowpipe Construction for Non-linear Hybrid Systems. In IEEE Real-Time Systems Symposium, 2012.
A3. C. Le Guernic, A. Girard, Reachability analysis of hybrid systems using support functions. In International Conference on Computer Aided Verification, 2009.
A2, A3 summary P: Sara, Jingbo, S: Chungha, Brandon
9/18 Verification Beyond Reachability A4. A. Donzé, O. Maler, Systematic simulation using sensitivity analysis. In Hybrid Systems: Computation and Control, 207.
A5. S. Prajna, A. Jadbabaie, Safety verification of hybrid systems using barrier certificates. In Hybrid Systems: Computation and Control, 2004.
A6. S. Gao, S. Kong, E. M. Clarke, Satisfiability modulo ODEs. In Formal Methods in Computer-Aided Design (FMCAD), 2013
A4, A5, A6 summary TBD
9/25 Introduction to Temporal Logic Temporal Logic -- TBD
10/2 Temporal Logic Robustness B2. G. Fainekos, G. Pappas, Robustness of temporal logic specifications for continuous-time signals. Theoretical Computer Science, 2009
B3. S. Jaksic, E. Bartocci, R. Grosu, D. Nickovic, Quantitative monitoring of STL with edit distance. In International Conference on Runtime Verification (pp. 201-218)
B2, B3 summary TBD
10/9 No class: ATVA conference -- -- Jyo
10/16 Proposal Presentations -- -- TBD
10/23 Misc. Topics B1. J. Kapinski, J. Deshmukh, X. Jin, H. Ito, K. Butts, Simulation-based Approaches for Verification of Embedded Control Systems, IEEE Control Systems, 36(6), 45-64, 2016.
B4. T. Wongpiromsarn, U. Topcu, and A. Lamperski, Automata theory meets barrier certificates: Temporal logic verification of nonlinear systems, IEEE Transactions on Automatic Control 2016.
B1, B4 summary TBD
10/30 Stochastic Verification B5. M. Kwiatkowska, G. Norman, and D. Parker, Stochastic model checking, International School on Formal Methods for the Design of Computer, Communication and Software Systems B5 summary TBD
11/6 CPS security C0. F. Pasqualetti, F. Dorfler, and F. Bullo, Control-theoretic methods for cyberphysical security: Geometric principles for optimal cross-layer resilient control systems, IEEE Control Systems, 2015 C0 summary TBD
11/13 AI verification/safety C1. G. Katz, C. Barrett, D. Dill, K. Julian, M. Kochenderfer, Reluplex: An efficient SMT solver for verifying deep neural networks. In International Conference on Computer Aided Verification 2017.
C2. M. Alshiekh, R. Bloem, R. Ehlers, B. Könighofer, S. Niekum, U. Topcu, Safe reinforcement learning via shielding, AAAI 2017.
C1, C2 summary TBD
11/20 AI verification/testing C3. S. Ghosh, F. Berkenkamp, G. Ranade, S. Qadeer, S., A. Kapoor, Verifying Controllers Against Adversarial Examples with Bayesian Optimization, ICRA 2018.
C4. C. E. Tuncali, G. Fainekos, H. Ito, J. Kapinski, Simulation-based Adversarial Test Generation for Autonomous Vehicles with Machine Learning Components, Intelligent Vehicles Symposium 2018
C3, C4 summary TBD
11/27 Final Project Presentations -- -- Jyo

** Not graded