Computer Science ›› 2019, Vol. 46 ›› Issue (9): 156-161.doi: 10.11896/j.issn.1002-137X.2019.09.022

• Information Security • Previous Articles     Next Articles

Systemic Muti-factors Based Verification Method for Safety-critical Software

LV Xiao-hu, HAN Xiao-dong, GONG Jiang-lei, WANG Zhi-jie, LIU Xiao-kun   

  1. (Institute of Telecommunication Satellite,China Academy of Space Technology,Beijing 100094,China)
  • Received:2018-07-30 Online:2019-09-15 Published:2019-09-02

Abstract: Software-intensive systems have been the inexorable development trend.The proportion of functions of safety-critical software keep growing,and the software safety problems are highlighted increasingly,in which the influence factors are characterized by complex,multidimensional,dynamic and insidious.Therefore,it’s urgent to seek a reasonable verification method for safety-critical software,and how to effectively verify it has become a difficult issue in software safety-related work.Based on the research and development of safety-critical software,this paper studied and proposed a verification method for safety-critical software based on systemic muti-factors,modeled the muti-factors that affect software safety from the point of system,and gave detailed verification methods and steps through constructing the requirement constraint sets and verification sets.The results of practical application show that the proposed method can effectively identify potential and systemic problems in safety-critical software compared with the traditional verification methods limited to software logic.

Key words: Constraint sets, Muti-factors, Safety-critical software, Verification sets

CLC Number: 

  • TP311.52
[1]ATHALYE P,MAKSIMOVIC D,ERICKSON R,et al.High-Performance front-end converter for avionics applications[J].IEEE Transactions.on Aerospace and Electronic Systems,2003,39(2):462-470.
[2]JIANG M X.Research on Safety Testing for Airborne Software[D].Nanjing:Nanjing University of Aeronautics and Astronautics,2015.(in Chinese)姜梦霞.机载软件的安全性测试研究[D].南京:南京航空航天大学,2015.
[3]GJB/Z 102A-2012.军用软件安全性设计指南[OL].http://www.gjb.corn.cn/.2012.
[4]GJB/Z 142-2004.军用软件安全性分析指南[OL].http://www.gjb.com.cn/.2004.
[5]FAN X G,CHU W K,ZHANG F M.Surveys of software safety[J].Computer Science,2011,38(5):8-13.(in Chinese)樊晓光,褚文奎,张凤鸣.软件安全性研究综述[J].计算机科学,2011,38(5):8-13.
[6]HUANG Z Q,XU B F,KAN S L,et al.Survey on EmbeddedSoftware Safety Analysis Standards,Methods and Tools for Airborne System[J].Journal of Software,2014,25(2):200-218.(in Chinese)黄志球,徐丙凤,阚双龙,等.嵌入式机载软件安全性分析标准、方法及工具研究综述[J].软件学报,2014,25(2):200-218.
[7]NASA.Software Safety:NASA-STD 8719.13C(2013)[S].NASA Technical Standard,7-77.
[8]STRINGFELLOW M,OWENS B,LEVESON N,et al.A Safety-Driven Systems Engineering Process[J].INCOSE International Symposium,2008,18(1):605-619.
[9]STRINGFELLOW M V,LEVESON N G,OWENS B D.Safety-Driven Design for Software-Intensive Aerospace and Automotive Systems[J].Proceedings of the IEEE,2010,98(4):515-525.
[10]ISHIMATSU T,LEVESON N G,THOMAS J P,et al.Hazard Analysis of Complex Spacecraft Using Systems-Theoretic Process Analysis[J].Journal of Spacecraft and Rockets,2014,51(2):509-522.
[11]ABDULKHALEQ A,WAGNER S,LEVESON N.A Comprehensive Safety Engineering Approach for Software-Intensive Systems Based on STPA[J].Procedia Engineering,2015,128(4):2-11.
[12]KNIGHT J C,LEVESON N G.Should software engineers be licensed?[J].Communications of the Acm,2002,45(11):87-90.
[13]ABDULKHALEQ A,WAGNER S.A Software Safety Verification Method Based on System-Theoretic Process Analysis[C]//International Conference on Computer Safety,Reliability,and Security.Springer International Publishing,2014.
[14]ABDULKHALEQ A,WAGNER S.Integrated Safety Analysis Using Systems-Theoretic Process Analysis and Software Model Checking[C]//International Conference on Computer Safety,Reliability,and Security.Springer,Cham,2014.
[15]FLEMING C H,LEVESON N.Integrating Systems Safety into Systems Engineering during Concept Development[J].INCOSE International Symposium,2015,25(1):989-1003.
[1] YANG Zhi-bin, YANG Yong-qiang, YUAN Sheng-hao, ZHOU Yong, XUE Lei, CHENG Gao-hui. Terminology Recommendation and Requirement Classification Method for Safety-critical Software [J]. Computer Science, 2021, 48(5): 32-44.
[2] . [J]. Computer Science, 2009, 36(5): 138-141.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!