Skip to main content

Showing 1–22 of 22 results for author: Waga, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.16767  [pdf, other

    cs.CR cs.FL

    Oblivious Monitoring for Discrete-Time STL via Fully Homomorphic Encryption

    Authors: Masaki Waga, Kotaro Matsuoka, Takashi Suwa, Naoki Matsumoto, Ryotaro Banno, Song Bian, Kohei Suenaga

    Abstract: When monitoring a cyber-physical system (CPS) from a remote server, kee** the monitored data secret is crucial, particularly when they contain sensitive information, e.g., biological or location data. Recently, Banno et al. (CAV'22) proposed a protocol for online LTL monitoring that keeps data concealed from the server using Fully Homomorphic Encryption (FHE). We build on this protocol to allow… ▽ More

    Submitted 26 May, 2024; originally announced May 2024.

  2. Temporal Logic Formalisation of ISO 34502 Critical Scenarios: Modular Construction with the RSS Safety Distance

    Authors: Jesse Reimann, Nico Mansion, James Haydon, Benjamin Bray, Agnishom Chattopadhyay, Sota Sato, Masaki Waga, Étienne André, Ichiro Hasuo, Naoki Ueda, Yosuke Yokoyama

    Abstract: As the development of autonomous vehicles progresses, efficient safety assurance methods become increasingly necessary. Safety assurance methods such as monitoring and scenario-based testing call for formalisation of driving scenarios. In this paper, we develop a temporal-logic formalisation of an important class of critical scenarios in the ISO standard 34502. We use signal temporal logic (STL) a… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

    Comments: 12 pages, 4 figures, 5 tables. Accepted to SAC 2024

  3. arXiv:2308.07930  [pdf, other

    cs.SE cs.FL cs.LG eess.SY

    Probabilistic Black-Box Checking via Active MDP Learning

    Authors: Junya Shijubo, Masaki Waga, Kohei Suenaga

    Abstract: We introduce a novel methodology for testing stochastic black-box systems, frequently encountered in embedded systems. Our approach enhances the established black-box checking (BBC) technique to address stochastic behavior. Traditional BBC primarily involves iteratively identifying an input that breaches the system's specifications by executing the following three phases: the learning phase to con… ▽ More

    Submitted 15 July, 2023; originally announced August 2023.

    Comments: Accepted to EMSOFT 2023

  4. arXiv:2305.17742  [pdf, other

    cs.FL

    Active Learning of Deterministic Timed Automata with Myhill-Nerode Style Characterization

    Authors: Masaki Waga

    Abstract: We present an algorithm to learn a deterministic timed automaton (DTA) via membership and equivalence queries. Our algorithm is an extension of the L* algorithm with a Myhill-Nerode style characterization of recognizable timed languages, which is the class of timed languages recognizable by DTAs. We first characterize the recognizable timed languages with a Nerode-style congruence. Using it, we gi… ▽ More

    Submitted 28 May, 2023; originally announced May 2023.

  5. arXiv:2301.03915  [pdf, other

    cs.DC

    Learning nonlinear hybrid automata from input--output time-series data

    Authors: Amit Gurung, Masaki Waga, Kohei Suenaga

    Abstract: Learning an automaton that approximates the behavior of a black-box system is a long-studied problem. Besides its theoretical significance, its application to search-based testing and model understanding is recently recognized. We present an algorithm to learn a nonlinear hybrid automaton (HA) that approximates a black-box hybrid system (HS) from a set of input--output traces generated by the HS.… ▽ More

    Submitted 27 July, 2023; v1 submitted 10 January, 2023; originally announced January 2023.

    Comments: 23 pages, 22 figures; including appendix

  6. arXiv:2210.17130  [pdf, other

    cs.CV cs.AI

    BOREx: Bayesian-Optimization--Based Refinement of Saliency Map for Image- and Video-Classification Models

    Authors: Atsushi Kikuchi, Kotaro Uchida, Masaki Waga, Kohei Suenaga

    Abstract: Explaining a classification result produced by an image- and video-classification model is one of the important but challenging issues in computer vision. Many methods have been proposed for producing heat-map--based explanations for this purpose, including ones based on the white-box approach that uses the internal information of a model (e.g., LRP, Grad-CAM, and Grad-CAM++) and ones based on the… ▽ More

    Submitted 31 October, 2022; originally announced October 2022.

    Comments: 32 pages. To appear in ACCV 2022

  7. arXiv:2207.13446  [pdf, other

    cs.LG cs.FL

    Dynamic Shielding for Reinforcement Learning in Black-Box Environments

    Authors: Masaki Waga, Ezequiel Castellano, Sasinee Pruekprasert, Stefan Klikovits, Toru Takisaka, Ichiro Hasuo

    Abstract: It is challenging to use reinforcement learning (RL) in cyber-physical systems due to the lack of safety guarantees during learning. Although there have been various proposals to reduce undesired behaviors during learning, most of these techniques require prior system knowledge, and their applicability is limited. This paper aims to reduce undesired behaviors during learning without requiring any… ▽ More

    Submitted 27 July, 2022; originally announced July 2022.

    Comments: This is the author (and extended) version of the manuscript of the same name published in the proceedings of the 20th International Symposium on Automated Technology for Verification and Analysis (ATVA 2022)

  8. arXiv:2206.03582  [pdf, other

    cs.CR cs.FL cs.LO

    Oblivious Online Monitoring for Safety LTL Specification via Fully Homomorphic Encryption

    Authors: Ryotaro Banno, Kotaro Matsuoka, Naoki Matsumoto, Song Bian, Masaki Waga, Kohei Suenaga

    Abstract: In many Internet of Things (IoT) applications, data sensed by an IoT device are continuously sent to the server and monitored against a specification. Since the data often contain sensitive information, and the monitored specification is usually proprietary, both must be kept private from the other end. We propose a protocol to conduct oblivious online monitoring -- online monitoring conducted wit… ▽ More

    Submitted 3 June, 2022; originally announced June 2022.

    Comments: This is the extended version of a paper to appear at CAV 2022

  9. Exemplifying parametric timed specifications over signals with bounded behavior

    Authors: Étienne André, Masaki Waga, Natsuki Urabe, Ichiro Hasuo

    Abstract: Specifying properties can be challenging work. In this paper, we propose an automated approach to exemplify properties given in the form of automata extended with timing constraints and timing parameters, and that can also encode constraints over real-valued signals. That is, given such a specification and given an admissible automaton for each signal, we output concrete runs exemplifying real (or… ▽ More

    Submitted 24 March, 2022; originally announced March 2022.

    Comments: This is the author (and extended) version of the manuscript of the same name published in the proceedings of the 14th NASA Formal Methods Symposium (NFM 2022). This work is partially supported by ERATO HASUO Metamathematics for Systems Design Project (No. JPMJER1603), JST and by the ANR-NRF French-Singaporean research program ProMiS (ANR-19-CE25-0015)

    Journal ref: Proceedings of the 14th NASA Formal Methods Symposium (NFM 2022), LNCS 13260, 2022

  10. arXiv:2109.04656  [pdf, ps, other

    cs.LO

    Efficient Black-Box Checking via Model Checking with Strengthened Specifications

    Authors: Junya Shijubo, Masaki Waga, Kohei Suenaga

    Abstract: Black-box checking (BBC)} is a testing method for cyber-physical systems (CPSs) as well as software systems. BBC consists of active automata learning and model checking; a Mealy machine is learned from the system under test (SUT), and the learned Mealy machine is verified against a specification using model checking. When the Mealy machine violates the specification, the model checker returns an i… ▽ More

    Submitted 10 September, 2021; originally announced September 2021.

    Comments: Accepted to RV'21

  11. arXiv:2102.07401  [pdf, other

    eess.SY cs.FL cs.LO

    Model-bounded monitoring of hybrid systems

    Authors: Masaki Waga, Étienne André, Ichiro Hasuo

    Abstract: Monitoring of hybrid systems attracts both scientific and practical attention. However, monitoring algorithms suffer from the methodological difficulty of only observing sampled discrete-time signals, while real behaviors are continuous-time signals. To mitigate this problem of sampling uncertainties, we introduce a model-bounded monitoring scheme, where we use prior knowledge about the target sys… ▽ More

    Submitted 15 February, 2021; originally announced February 2021.

    Comments: This is the author (and slightly extended) version of the manuscript of the same name published in the proceedings of the 12th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS 2021)

    ACM Class: D.2.4; F.3.1

  12. Falsification of Cyber-Physical Systems with Robustness-Guided Black-Box Checking

    Authors: Masaki Waga

    Abstract: For exhaustive formal verification, industrial-scale cyber-physical systems (CPSs) are often too large and complex, and lightweight alternatives (e.g., monitoring and testing) have attracted the attention of both industrial practitioners and academic researchers. Falsification is one popular testing method of CPSs utilizing stochastic optimization. In state-of-the-art falsification methods, the re… ▽ More

    Submitted 9 November, 2021; v1 submitted 24 April, 2020; originally announced May 2020.

    Comments: Accepted to HSCC 2020

  13. arXiv:2004.06581  [pdf, other

    cs.NE cs.AI cs.FL

    Genetic Algorithm for the Weight Maximization Problem on Weighted Automata

    Authors: Elena Gutiérrez, Takamasa Okudono, Masaki Waga, Ichiro Hasuo

    Abstract: The weight maximization problem (WMP) is the problem of finding the word of highest weight on a weighted finite state automaton (WFA). It is an essential question that emerges in many optimization problems in automata theory. Unfortunately, the general problem can be shown to be undecidable, whereas its bounded decisional version is NP-complete. Designing efficient algorithms that produce approxim… ▽ More

    Submitted 11 April, 2020; originally announced April 2020.

    Comments: Accepted at GECCO 2020

    MSC Class: 68Q45

  14. arXiv:1906.12133  [pdf, other

    cs.FL

    Online Quantitative Timed Pattern Matching with Semiring-Valued Weighted Automata

    Authors: Masaki Waga

    Abstract: Monitoring of a signal plays an essential role in the runtime verification of cyber-physical systems. Qualitative timed pattern matching is one of the mathematical formulations of monitoring, which gives a Boolean verdict for each sub-signal according to the satisfaction of the given specification. There are two orthogonal directions of extension of the qualitative timed pattern matching. One dire… ▽ More

    Submitted 28 June, 2019; originally announced June 2019.

    Comments: Accepted to FORMATS 2019

  15. Symbolic Monitoring against Specifications Parametric in Time and Data

    Authors: Masaki Waga, Étienne André, Ichiro Hasuo

    Abstract: Monitoring consists in deciding whether a log meets a given specification. In this work, we propose an automata-based formalism to monitor logs in the form of actions associated with time stamps and arbitrarily data values over infinite domains. Our formalism uses both timing parameters and data parameters, and is able to output answers symbolic in these parameters and in the log segments where th… ▽ More

    Submitted 11 May, 2019; originally announced May 2019.

    Comments: Accepted to CAV 2019

  16. arXiv:1904.02931  [pdf, other

    cs.LG stat.ML

    Weighted Automata Extraction from Recurrent Neural Networks via Regression on State Spaces

    Authors: Takamasa Okudono, Masaki Waga, Taro Sekiyama, Ichiro Hasuo

    Abstract: We present a method to extract a weighted finite automaton (WFA) from a recurrent neural network (RNN). Our algorithm is based on the WFA learning algorithm by Balle and Mohri, which is in turn an extension of Angluin's classic \lstar algorithm. Our technical novelty is in the use of \emph{regression} methods for the so-called equivalence queries, thus exploiting the internal state space of an RNN… ▽ More

    Submitted 20 November, 2019; v1 submitted 5 April, 2019; originally announced April 2019.

    Comments: AAAI 2020. We are preparing to distribute the implementation

  17. Online Parametric Timed Pattern Matching with Automata-Based Skip**

    Authors: Masaki Waga, Étienne André

    Abstract: Timed pattern matching has strong connections with monitoring real-time systems. Given a log and a specification containing timing parameters (that can capture uncertain or unknown constants), parametric timed pattern matching aims at exhibiting for which start and end dates, as well as which parameter valuations, a specification holds on that log. This problem is notably close to robustness. We p… ▽ More

    Submitted 18 March, 2019; originally announced March 2019.

    Comments: Accepted to NFM 2019. arXiv admin note: text overlap with arXiv:1812.08940

    Journal ref: Lecture Notes in Computer Science, volume 11460, pages 371-389, May 2019

  18. Offline timed pattern matching under uncertainty

    Authors: Étienne André, Ichiro Hasuo, Masaki Waga

    Abstract: Given a log and a specification, timed pattern matching aims at exhibiting for which start and end dates a specification holds on that log. For example, "a given action is always followed by another action before a given deadline". This problem has strong connections with monitoring real-time systems. We address here timed pattern matching in presence of an uncertain specification, i.e., that may… ▽ More

    Submitted 20 December, 2018; originally announced December 2018.

    ACM Class: F.4

    Journal ref: ICECCS 2018, IEEE CPS, pages 10-20, December 2018. Best paper award

  19. Moore-Machine Filtering for Timed and Untimed Pattern Matching

    Authors: Masaki Waga, Ichiro Hasuo

    Abstract: Monitoring is an important body of techniques in runtime verification of real-time, embedded, and cyber-physical systems. Mathematically, the monitoring problem can be formalized as a pattern matching problem against a pattern automaton. Motivated by the needs in embedded applications---especially the limited channel capacity between a sensor unit and a processor that monitors---we pursue the idea… ▽ More

    Submitted 11 July, 2019; v1 submitted 22 October, 2018; originally announced October 2018.

    Comments: Accepted for presentation at EMSOFT 2018 and for publication in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD) as part of the ESWEEK-TCAD special issue

    Journal ref: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems ( Volume: 37 , Issue: 11 , Nov. 2018 )

  20. MONAA: A Tool for Timed Pattern Matching with Automata-Based Acceleration

    Authors: Masaki Waga, Ichiro Hasuo, Kohei Suenaga

    Abstract: We present monaa, a monitoring tool over a real-time property specified by either a timed automaton or a timed regular expression. It implements a timed pattern matching algorithm that combines 1) features suited for online monitoring, and 2) acceleration by automata-based skip**. Our experiments demonstrate monaa's performance advantage, especially in online usage.

    Submitted 22 October, 2018; originally announced October 2018.

    Comments: Published in: 2018 IEEE Workshop on Monitoring and Testing of Cyber-Physical Systems (MT-CPS)

  21. Efficient Online Timed Pattern Matching by Automata-Based Skip**

    Authors: Masaki Waga, Ichiro Hasuo, Kohei Suenaga

    Abstract: The timed pattern matching problem is an actively studied topic because of its relevance in monitoring of real-time systems. There one is given a log $w$ and a specification $\mathcal{A}$ (given by a timed word and a timed automaton in this paper), and one wishes to return the set of intervals for which the log $w$, when restricted to the interval, satisfies the specification $\mathcal{A}$. In our… ▽ More

    Submitted 28 June, 2017; originally announced June 2017.

    Journal ref: Formal Modeling and Analysis of Timed Systems. FORMATS 2017. Lecture Notes in Computer Science, vol 10419. Springer, Cham

  22. A Boyer-Moore Type Algorithm for Timed Pattern Matching

    Authors: Masaki Waga, Takumi Akazaki, Ichiro Hasuo

    Abstract: The timed pattern matching problem is formulated by Ulus et al. and has been actively studied since, with its evident application in monitoring real-time systems. The problem takes as input a timed word/signal and a timed pattern (specified either by a timed regular expression or by a timed automaton); and it returns the set of those intervals for which the given timed word, when restricted to the… ▽ More

    Submitted 30 June, 2016; v1 submitted 23 June, 2016; originally announced June 2016.

    Journal ref: Formal Modeling and Analysis of Timed Systems. FORMATS 2016. Lecture Notes in Computer Science, vol 9884. Springer, Cham