Project Details
Projekt Print View

Theory and Applications of Reachability Analysis in the Discrete Space

Subject Area Automation, Mechatronics, Control Systems, Intelligent Technical Systems, Robotics
Term since 2025
Project identifier Deutsche Forschungsgemeinschaft (DFG) - Project number 564740977
 
Reachability analysis is a vital tool in control systems for formally verifying logical system behavior and preventing undesired states. However, when dealing with logical systems over Boolean vector spaces, the computational complexity grows exponentially with the dimension, posing a significant challenge. This "curse of dimensionality" necessitates innovative approaches to mitigate complexities. Inspired by the effectiveness of set-based theory in real vector spaces, this proposal introduces novel applications of my previously proposed binary set representations - logical zonotopes and polynomial logical zonotopes - which are constructed by XORing a binary vector with a combination of other binary vectors called generators. An approach is developed for the formal verification of logical systems to deal with uncertain inputs using binary sets. This involves leveraging logical zonotopes and polynomial logical zonotopes, capable of representing up to 2^n points with just n generators, enabling efficient logical operations in the generator space, and streamlining reachability analysis. Instead of verifying single inputs, the proposed methodologies ensure correctness and safety by computing reachable sets of system outputs, leveraging binary sets. Furthermore, A strategy within the generator space of binary sets is proposed, which enhances model-checking efficiency against linear temporal logic specifications. Additionally, the application of binary set representations extends to the search for encryption keys to detect insecure encryption schemes, transforming it into a forward model-based reachability analysis problem with the uncertain bit key, which contains 0 and 1 in a set. By leveraging set theory to represent sets of uncertain bits, this approach significantly improves the efficiency of exhaustive key searches by concurrently exploring both 0 and 1 key values for each bit. Considering messages and their ciphertexts, the goal is to execute encryption using sets of keys, resulting in a corresponding set of ciphertexts. If the given ciphertext does not belong to the set of ciphers, I can confidently eliminate the set of keys from my exhaustive search. Otherwise, I can divide this key set into smaller subsets and continue the search until I find the secret key. Overall, this proposal aims to underscore reachability analysis as a potent methodology applicable to diverse problems, including digital verification, model checking, and exhaustive key searches.
DFG Programme Emmy Noether Independent Junior Research Groups
International Connection Sweden
 
 

Additional Information

Textvergrößerung und Kontrastanpassung