PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
  • Sesja wygasła!
Tytuł artykułu

Hierarchical state machine model for analyzing safety hazards in real-time systems

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Real-time systems must avoid hazardous situations. To achieve this, their functionality should be investigated under time constraints. A model based on Hierarchical Communicating Real-time State Machine (H-CRSM) and analysis methodology is proposed in this paper with the objective of obtaining any hazardous events that may occur in the input ANSI-C program. The system outputs a scenario list of the different hazards. A path in the code showing the cause of the undesirable event is associated with each hazardous scenario. The strength of the proposed methodology is that the process of hazardous situation detection does not require the running of the ANSI-C program many times with distinct values for the inputs. It also focuses on analyzing the software level of the life cycle. It is not like most of the verification and analysis tools that check system levels. The system level may be bug-free, but the software level may not be.
Wydawca
Czasopismo
Rocznik
Tom
Strony
39--80
Opis fizyczny
Bibliogr. 34 poz., rys., tab.
Twórcy
  • Benha University, Faculty of Engineering at Shoubra, Egypt
autor
  • Benha University, Faculty of Engineering at Shoubra, Egypt
  • Benha University, Faculty of Engineering at Shoubra, Egypt
Bibliografia
  • [1] 4th International Workshop on CPAchecker, 2019. https://cpa.sosy-lab.org/ 2019/ [online; accessed 11.11.2019].
  • [2] Andrews J.D., Dunnett S.J.: Event-tree analysis using binary decision diagrams. In: IEEE Transactions on Reliability, vol. 49(2), pp. 230–238, 2000. https://doi. org/10.1109/24.877343.
  • [3] Astree Static-analysis Tool, 2019. http://www.astree.ens.fr/ [online; accessed 11.11.2019].
  • [4] Bakr A.M., Fouda M.M., Salama M., Alsammak A.K., Yahia H.: Hazard Analysis of Real-time Safety Critical Systems Using Hierarchical Communicating Realtime State Machines Formal Model. In: 2017 12th International Conference on Computer Engineering and Systems (ICCES), pp. 628–634, 2017. https://doi. org/10.1109/ICCES.2017.8275381.
  • [5] Bakr A.M., Fouda M.M., Salama M., Alsammak A.K., Yahia H.: Modeling real-time safety critical systems using hierarchical communicating real-time state machines and c-lang parser. In: 2017 Eighth International Conference on Intelligent Computing and Information Systems (ICICIS), pp. 244–251, 2017. https://doi.org/10.1109/INTELCIS.2017.8260054.
  • [6] Bertolino A.: Software Testing Research: Achievements, Challenges, Dreams. In: Future of Software Engineering, 2007, FOSE ’07, pp. 85–103, 2007.
  • [7] BLAST Static-analysis Tool, 2019. http://mtc.epfl.ch/software-tools/blast/ index-epfl.php [online; accessed 11.11.2019].
  • [8] Coverity, 2019. https://scan.coverity.com/ [online; accessed 11.11.2019].
  • [9] Ericson C.A.: Fault tree analysis. In: System Safety Conference, Orlando, Florida, vol. 1, pp. 1–9, 1999.
  • [10] Ericson C.A.: Hazard analysis techniques for system safety. John Wiley & Sons, 2015.
  • [11] Ethiopian Airlines Flight 302 – Wikipedia, The Free Encyclopedia, 2019. https:// en.wikipedia.org/wiki/Ethiopian Airlines Flight 302 [online; accessed 9.04.2019].
  • [12] Fortino G., Furfaro A., Nigro L., Pupo F.: Hierarchical Communicating Real-Time State Machines. In: Laboratorio di Ingegneria del Software, Dipartimento di Elettronica Informatica e Sistemistica, Universita della Calabria, pp. 1–12, 2000.
  • [13] Furfaro A., Nigro L.: Model Checking Hierarchical Communicating Real-time State Machines. In: 2005 IEEE Conference on Emerging Technologies and Factory Automation, vol. 1, pp. 354–370, 2005.
  • [14] Gario A., Andrews A., Hagerman S.: Testing of safety-critical systems: An aerospace launch application. In: 2014 IEEE Aerospace Conference, pp. 1–17, 2014. https://doi.org/10.1109/AERO.2014.6836410.
  • [15] Helix-QAC, 2019. https://www.perforce.com/products/helix-qac [online; accessed 11.11.2019].
  • [16] Infer, 2019. https://fbinfer.com/ [online; accessed 11.11.2019].
  • [17] Ishimatsu T., Leveson N.G., Thomas J., Katahira M., Miyamoto Y., Nakao H.: Modeling and Hazard Analysis Using STPA. In: Proceedings of the 4th IAASS Conference, Making Safety Matter, pp. 19–21, 2010.
  • [18] Jenab K., Dhillon B.S.: Stochastic Fault Tree Analysis With Self-loop Basic Events. In: IEEE Transactions on Reliability, vol. 54(1), pp. 173–180, 2005. https://doi.org/10.1109/TR.2004.842087.
  • [19] Johannessen P., Grante C., Alminger A., Eklund U., Torin J.: Hazard analysis in object oriented design of dependable systems. In: 2001 International Conference on Dependable Systems and Networks, pp. 507–512, 2001. https://doi.org/10. 1109/DSN.2001.941436.
  • [20] Lee, Seshia: Introduction to Embedded Systems. MIT Press, 2017.
  • [21] Lee E.A.: Cyber Physical Systems: Design Challenges. In: 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC), pp. 363–369, 2008.
  • [22] Leupolz J., Habermaier A., Reif W.: Quantitative and qualitative safety analysis of a hemodialysis machine with S#. In: Journal of Software: Evolution and Process, vol. 30(5), p. e1942, 2018. https://doi.org/10.1002/smr.1942. E1942 JSME-17-0029.R2.
  • [23] Lion Air Flight 610 – Wikipedia, The Free Encyclopedia, 2019. https://en. wikipedia.org/wiki/Lion Air Flight 610 [online; accessed 9.04.2019].
  • [24] Lutz R.R.: Analyzing software requirements errors in safety-critical, embedded systems. In: [1993] Proceedings of the IEEE International Symposium on Requirements Engineering, pp. 126–133, 1993. https://doi.org/10.1109/ISRE.1993. 324825.
  • [25] Macher G., Sporer H., Berlach R., Armengaud E., Kreiner C.: SAHARA: A security-aware hazard and risk analysis method. In: 2015 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 621–624, 2015. https://doi. org/10.7873/DATE.2015.0622.
  • [26] Polyspace, 2019. https://www.mathworks.com/products/polyspace.html [online; accessed 11.11.2019].
  • [27] Rao C., Guo J., Li N., Lei Y., Zhang Y.L., Li Y.: Safety-Critical System Modeling in Model-Based Testing with Hazard and Operability Analysis. In: 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS), pp. 397–404, 2018. https://doi.org/10.1109/QRS.2018.00053.
  • [28] Reddy Y.B.: Cloud-Based Cyber Physical Systems: Design Challenges and Security Needs. In: 2014 10th International Conference on Mobile Ad-hoc and Sensor Networks, pp. 315–322. 2014. https://doi.org/10.1109/MSN.2014.50.
  • [29] Shaw A.C.: Communicating real-time state machines. In: IEEE Transactions on Software Engineering, vol. 18(9), pp. 805–816, 1992.
  • [30] Takahashi M., Kosaka R., Nanba R., Anang Y., Watanabe Y.: A study of methodology for securing control software based FMEA-FTA coordination. In: 2016 IEEE/SICE International Symposium on System Integration (SII), pp. 144–149, 2016. https://doi.org/10.1109/SII.2016.7843989.
  • [31] Tesla driver crash with a truck, 2019. https://electrek.co/2019/03/01/ tesla-driver-crash-truck-trailer-autopilot/ [online; accessed 9.04.2019].
  • [32] Toyota car recalls – Wikipedia, The Free Encyclopedia, 2010. https://en. wikipedia.org/wiki/2009%E2%80%9311 Toyota vehicle recalls [online; accessed 9.04.2019].
  • [33] Yoo J., Jee E., Cha S.: Formal Modeling and Verification of Safety-Critical Software. In: IEEE Software, vol. 26(3), pp. 42–49, 2009. https://doi.org/10.1109/ MS.2009.67.
  • [34] Zhu D., Yao S.: A Hazard Analysis Method for Software-Controlled Systems Based on System-Theoretic Accident Modeling and Process. In: 2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS), pp. 90–95, 2018. https://doi.org/10.1109/ICSESS.2018.8663927.
Uwagi
PL
„Opracowanie rekordu ze środków MNiSW, umowa Nr 461252 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2021).”
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-c0f804b2-3ee7-4022-82b4-c31a675e26a2
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.