DOC PREVIEW
USC CSCI 599 - Week10_b

This preview shows page 1-2-3-4-5 out of 16 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Software Engineering for Safety : A RoadmapIntroductionSlide 3Keys Areas in SE for SafetyHazard AnalysisSafety Requirements Specification and AnalysisDesigning for SafetyTestingCertification and StandardsResourcesDirections for future WorkFault TreesDirections………….Directions……..Directions…..Conclusion....Software Engineering for Software Engineering for Safety : A RoadmapSafety : A RoadmapPresentation by:Presentation by:Manu D VijManu D VijCS 599 Software Engineering for Embedded SystemsIntroductionIntroduction•Wide Spread Use of Safety - Critical Wide Spread Use of Safety - Critical Systems and their reliance on Systems and their reliance on SoftwareSoftware•““The Nation depends on fragile The Nation depends on fragile software”software”Keys Areas in SE for SafetyKeys Areas in SE for Safety•Hazard AnalysisHazard Analysis•Safety requirements specification Safety requirements specification and analysisand analysis•Designing for safetyDesigning for safety•TestingTesting•Certification and StandardsCertification and Standards•ResourcesResourcesHazard AnalysisHazard Analysis•Core of the development of safe systemsCore of the development of safe systems•Identification and Analysis:Identification and Analysis:–CriticalityCriticality–Likelihood of OccurrenceLikelihood of Occurrence•Which Hazards to avoid ?Which Hazards to avoid ?•Determination of s/w components that can Determination of s/w components that can contribute or prevent hazardcontribute or prevent hazard•Safety requirements and constraints on Safety requirements and constraints on design of systemdesign of systemSafety Requirements Safety Requirements Specification and AnalysisSpecification and Analysis•Formal Specification:Formal Specification:–Ease and AccuracyEase and Accuracy–Investigate if safety properties are preservedInvestigate if safety properties are preserved–Automated check availabilityAutomated check availability•Interactive theorem provers, Model checkersInteractive theorem provers, Model checkers•SafetySafety Software Requirements Software Requirements RequirementsRequirements•SpecTRM ----- Embedded SystemsSpecTRM ----- Embedded SystemsDesigning for SafetyDesigning for Safety•Design for SafetyDesign for Safety–PreventionPrevention–Detection and ControlDetection and Control•Design Trade OffsDesign Trade Offs–Safety Vs Other features e.g. Fault ToleranceSafety Vs Other features e.g. Fault Tolerance–Issues involved are moral, legal, finance……Issues involved are moral, legal, finance……•Vulnerability to simple design errorsVulnerability to simple design errors–Tendency to neglect small errorsTendency to neglect small errors–““Small Errors have small consequence”– not in SoftwareSmall Errors have small consequence”– not in Software•Limited use of known design techniquesLimited use of known design techniques–Good design techniques are ignoredGood design techniques are ignoredTestingTesting•Critical for safe system in:Critical for safe system in:–DevelopmentDevelopment–CertificationCertification•Assumptions about:Assumptions about:–EnvironmentEnvironment–UsersUsers–OperationsOperations•Is it enough ?Is it enough ?Certification and StandardsCertification and Standards•CertificationCertification–More complicatedMore complicated–Less well definedLess well defined•StandardsStandards–““What standards are appropriate for large, safety-critical What standards are appropriate for large, safety-critical systems composed of subsystems from different domains”systems composed of subsystems from different domains”–Problems: Problems: • Lack of guidance in existing standardsLack of guidance in existing standards• Poor integration of software issues with system safetyPoor integration of software issues with system safety•Heavy burden of making a safety case for certificationHeavy burden of making a safety case for certification–Recommendations:Recommendations:•Classifying and evaluating standards according to Classifying and evaluating standards according to products, process and resourcesproducts, process and resources•Constructing domain specific standards for productsConstructing domain specific standards for productsResourcesResources•Books…. LevensonBooks…. Levenson•Bowen’s website…. Publications, Bowen’s website…. Publications, Conferences, RISKforumConferences, RISKforum•IEEE videoIEEE videoDirections for future WorkDirections for future Work•Integration of informal and Integration of informal and formal methodsformal methods –Key Areas:Key Areas:•Automatic translation of informal Automatic translation of informal notation into formal models notation into formal models•Lightweight formal methodsLightweight formal methods•Integration of previously distinct Integration of previously distinct formal methods. formal methods.Fault TreesFault Trees•hazard events hazard events represented by represented by nodesnodes•AND/OR gatesAND/OR gates•domino effectdomino effect•errors in the errors in the requirements phaserequirements phaseexample taken from: example taken from: http://www.cs.cmu.edu/~kohttp://www.cs.cmu.edu/~koopman/des_s99/safety_critiopman/des_s99/safety_critical/cal/Directions………….Directions………….•Constraints on safe product families and Constraints on safe product families and safe reusesafe reuse –Two key research areas:Two key research areas:•Safety Analysis of product familiesSafety Analysis of product families–A GoalA Goal•Safety reuse of COTS softwareSafety reuse of COTS software–Two ProblemsTwo ProblemsDirections……..Directions……..•Testing & EvaluationTesting & Evaluation–Requirements-based testingRequirements-based testing–Evaluation from multiple sourcesEvaluation from multiple sources–Model consistencyModel consistency–Virtual environment simulationsVirtual environment simulations•Runtime monitoringRuntime monitoringDirections…..Directions…..•Education:Education:–Scientific rather than methodical coursesScientific rather than methodical courses–TextbooksTextbooks–AwarenessAwareness•Related FieldsRelated Fields–Security & SurvivabilitySecurity & Survivability•Techniques quite similarTechniques quite similar•Security Vs SafetySecurity Vs Safety–Software ArchitectureSoftware Architecture•Safety consequence


View Full Document

USC CSCI 599 - Week10_b

Documents in this Course
Week8_1

Week8_1

22 pages

Week2_b

Week2_b

10 pages

LECT6BW

LECT6BW

20 pages

LECT6BW

LECT6BW

20 pages

5

5

44 pages

12

12

15 pages

16

16

20 pages

Nima

Nima

8 pages

Week1

Week1

38 pages

Week11_c

Week11_c

30 pages

afsin

afsin

5 pages

October5b

October5b

43 pages

Week11_2

Week11_2

20 pages

final

final

2 pages

c-4

c-4

12 pages

0420

0420

3 pages

Week9_b

Week9_b

20 pages

S7Kriegel

S7Kriegel

21 pages

Week4_2

Week4_2

16 pages

sandpres

sandpres

21 pages

Week6_1

Week6_1

20 pages

4

4

33 pages

Week10_c

Week10_c

13 pages

fft

fft

18 pages

LECT7BW

LECT7BW

19 pages

24

24

15 pages

14

14

35 pages

Week9_c

Week9_c

24 pages

Week11_67

Week11_67

22 pages

Week1

Week1

37 pages

LECT3BW

LECT3BW

28 pages

Week8_c2

Week8_c2

19 pages

Week5_1

Week5_1

19 pages

LECT5BW

LECT5BW

24 pages

Week11_1

Week11_1

43 pages

Week7_2

Week7_2

15 pages

Week5_b

Week5_b

19 pages

Week11_a

Week11_a

29 pages

LECT14BW

LECT14BW

24 pages

T7kriegel

T7kriegel

21 pages

0413

0413

2 pages

3

3

23 pages

C2-TSE

C2-TSE

16 pages

10_19_99

10_19_99

12 pages

s1and2-v2

s1and2-v2

37 pages

Week10_3

Week10_3

23 pages

jalal

jalal

6 pages

1

1

25 pages

T3Querys

T3Querys

47 pages

CS17

CS17

15 pages

porkaew

porkaew

20 pages

LECT4BW

LECT4BW

21 pages

Week10_1

Week10_1

25 pages

wavelet

wavelet

17 pages

October5a

October5a

22 pages

p289-korn

p289-korn

12 pages

2

2

33 pages

rose

rose

36 pages

9_7_99

9_7_99

18 pages

Week10_2

Week10_2

28 pages

Week7_3

Week7_3

37 pages

Load more
Download Week10_b
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Week10_b and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Week10_b 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?