Safety-certified tools makes the difference

Size: px
Start display at page:

Download "Safety-certified tools makes the difference"

Transcription

1 by Anders Holmberg, Product Manager, IAR Systems Safety-certified tools makes the difference In November of 2013, Renesas Electronics announced the development of a functional IEC compliant safety package for the RX631 and RX63N family of devices and at the same time, Renesas Electronics and IAR Systems announced the availability of a safety-certified development and build toolchain for the RX family of microcontrollers. The combination of hardware with a known history, application software, and diagnostic software and development tools with safety-certification is a very powerful enabler that allows the developers of safety-critical applications to hit the ground running and get their end product certified as quickly as possible, thus saving money as well as time-to-market. In this article we examine what benefits accrue to users of a certified development and build chain. 1. History repeat Over the last decades there has been a tremendous increase in the number of embedded projects that have to somehow cope with requirements on functional safety. Products for applications in measurement and control, medical devices, automotive and so on are increasingly required to fulfill certain reliability thresholds and behave safely in the event of failure. The avionics field on the other hand has obsessed with safety and reliability for a long time. Unfortunately, every niche have had their own standards and concepts related to safety although the underlying ideas are very similar. However, a strong trend since the turn of the century is a drive to unify standards and concepts so that for example methods and concepts from one standard can be applied also for another application area if justifiable. A driver for parts of this unification is the work with revising the IEC standard for Functional safety of electrical/electronic/programmable electronic safety-related systems into its second edition. It was released in 2010 and now serves as a reference standard for all kinds of programmable electronic devices, although sector specific standards in for example railway and machinery are very important to codify the safety related knowledge that is fundamental for the specific application area. The IEC standard is especially interesting, since it is a direct application of IEC in a machinery specific context. The automotive standard ISO is also an application of IEC 61508, but takes a slightly different view on safety integrity levels etc. The trend towards more formal requirements on safety related functionality is partly driven by the market; end users and product integrators higher up in the value chain demand high reliability and need some form of independent judge on what s safe and what s not. This opens up for product certifications of different kinds, where IEC compliance is probably the most important one in terms of impact on our industry. The second driver is international or national regulations that require compliance with named standards. The end result is that more and more products are now under pressure to comply with functional safety requirements. This trend is not likely to change in the short run. Rather to the contrary, the number of devices with some sort of incorporated safety functionality will continue to grow. The complexity will also go up as the Internet-of-Things spread and everything from toasters to emergency functionality in your car will be connected to the outside world and the internet. This evolution also blurs the line between functional safety and device security, at least in software development since the concepts partly overlap A device that is for example susceptible to break-in attempts due to buffer overrun errors might just as well crash due to malformed data erroneously produced by a legitimate peripheral, or it might be forced to turn off the safety functionality by a malicious intruder. A paper by Stephen Checkoway and colleagues at University of California, San Diego {Comprehensive Experimental Analyses of Automotive Attack Surfaces} describe several attack channels in a modern car, where for example the in-car entertainment system can be compromised to allow command access to one or more CAN busses in the car. Another recent example that made the headlines is an online fridge that was recruited as part of a botnet to send spam s.

2 Page 2 2. Brace for impact In the hardware domain, designing a functional safety system includes answering some very basic questions: how do I ensure reliability and integrity of the selected components? How can I make sure they function as they should when reality strikes? For some components, failure rates and failure modes are fairly well understood and such components in critical pathways can either relatively easy be dimensioned to cope with required failure rates or doubled or tripled to further reduce the possibility of malfunction. In the latter case you can even opt for different suppliers to lessen the risk for common mode failures. In principle, the same kind of analysis must be carried out for the microcontroller you consider using, but a typical MCU is such a complex beast that other measures must be considered. One thing to consider is resilience to things like radiation etc. that can cause random bit errors on busses or in memory. Another is wear and tear, where especially non-volatile storage can be a serious threat due to approaching the limits on read and write cycles. A third source of issues is malfunctioning software, where things like writing beyond the stack can have disastrous effect. With their safety package for RX, Renesas Electronics provide a solid foundation for your safety related considerations by providing certified information and software that can be slotted into your project. One part of the package is a safety manual including among other things description of the safety mechanisms available and failure rates etc. A second part is a comprehensive self-test diagnostic library for the CPU core, RAM and flash ROM. This diagnostic library was tested with very high test coverage, by for example injecting and simulating faults at the gate level. A third part is slightly more intangible, but is still very important. The devices covered by the package are proven in the market and their performance in terms of possible failure modes is known, which is a huge advantage compared to selecting a device that is brand new on the market. Renesas Electronics is really ahead of the game with their safety package and since there are also certified software development tools and RTOS implementations available a large part of the necessary ground work is already done. This kind of offerings will become even more important as the market for safety related development grows. 3. Standards apply? If you are about to start a software project with safety-critical functionality or functional safety requirements, you are probably already aware that the tools you use must somehow be qualified as suitable for safety-related development. The exact requirements for how to qualify development tools differ to some extent on the criticality of a malfunctioning safety function or product. It is also dependent on the nature of the tool; a compiler that produces code that goes into your product is trickier to qualify than a source code metrics tool, which in turn is trickier to qualify than a version control system or a requirements management system. Section and sub clauses of IEC 61508, part 3 details how support tools should be qualified. However, the standard is not very detailed on exactly how a C compiler should be qualified; for example, clause states among other things that the selected programming language shall have a translator which has been assessed for fitness for purpose including, where appropriate, assessment against the international or national standards The notes to that clause then tries to explain some of the available mechanisms for a qualification effort. Taking this and other statements in the standard together indicates that qualifying a build toolchain for use in your project can result in a lot of work and associated document production, especially for higher Safety Integrity Levels. Further, if the assessment is too focused on the current project, it can be difficult to directly reuse the results in other projects. Moreover, there is a common misconception that if your project uses the same uncertified tool as another project that did achieve a safety-related certification, your tool magically becomes qualified for development of safety-critical systems. This is not the case because you are still required to prove that your project is similar enough to the other project in such a manner that you use the same functionality and in the same manner as the other project. Generally, you end up being required to provide justification all over again that your tool is still qualified.

3 Page 3 4. Jumping through the hoops As mentioned, performing an in-house qualification of your selected build tools is often very timeconsuming and the needed skills have more in common with compiler writing and testing and less in common with the typical skills required for safety critical development that is close to the hardware. Further, how do you really validate that the build chain is compliant with relevant language standards? Can you get hold of a safety manual for the tool chain? What about carrying out a HAZOP analysis for the tool chain? To eliminate most of these questions and the associated work, IAR Systems has carried out a very comprehensive certification effort for our IAR Embedded Workbench for Renesas RX together with Renesas Electronics and TÜV SÜD, specialists in functional safety and associated assessments. The assessment of our build chain covers the following areas: Our development processes and our ability to develop high-quality software in a repeatable fashion, including how we work with the specific requirements put forth by different functional safety standards. Test and quality measures, including validation of compliance with different language standards. Our processes for dealing with issues reported from the field and how users get updated about potential issues. The safety information in the safety manual and all other documentation. The assessment also covered softer issues like how many active users we have on our build chains for different MCU targets and how we make sure that the right product reaches a customer. The assessment covers both IEC and the sector-specific automotive standard ISO The latter standard is partly derived from IEC and has taken a position on tools qualification that is similar in intent but slightly different in action from IEC The outcome of the assessment is that the build tools incorporated in IAR Embedded Workbench for Renesas RX version fulfills the requirements applicable to software development tools as given by both IEC and ISO The coverage of the automotive standard can be considered a bonus from how we work but it is also a good example of the fact that different standards can have very similar requirements. 5. How on earth? If you have already been through one or more safety related projects with formal certification requirements, you know the value and importance of a streamlined process. It can sometimes be tempting to invent complex processes that involve lots and lots of paperwork and the production of artifacts that in the end are justified only by the process itself and not by the real issues the processes are intended to address. In fact, one of the biggest challenges in adapting existing development processes to the requirements in IEC is to avoid over-engineering of the processes while at the same time fulfill the requirements of safety goals, traceability, decision justification, safety planning, testing and validation/verification, and feedback loops etc. as described by the standard and the V model. Of course you don t want to cut corners or take them on two wheels, but your processes should be a help to reach your goals, not a hindrance. Another challenge is, as always, the need to balance factors like: The bill-of-materials and associated production costs, especially for high-volume products. Time-to-market and perceived market window. Buy, develop yourself or outsource various needed parts for the project? This includes not only pure development activities, but also things like specification work, functional safety management, validation and verification, qualification of hardware, tools, third-party components, etc.

4 Page 4 As suppliers of microcontrollers and development tools it s not really surprising that we advocate our own solutions, but we are convinced that existing solutions that deliver on the promise to cut down on the red tape will in the end be worth every cent. 6. Software galore In developing safety critical software the relevant standards like IEC put stringent and rather heavy requirements on how the software shall be developed. This includes things like using the V model for organizing the overall project, how you select programming language and what features you can use in the selected language. There is usually also strong advice on how to test and verify the functionality of your device and especially the parts that are relevant for functional safety. It can be quite tricky to balance the need for various safety precautions that can for example drive up total memory usage and the requirements from production and market to keep the price down while at the same time retain margins. On the other hand a lot of the recommendations in for example IEC make sense also for general development of embedded systems. For example, the certified library from Renesas Electronics for MCU self-test is useful for any product where functional integrity is highly valued. Here is another challenge: Using optimizations and language extensions are not generally encouraged by safety standards, but it is our firm belief that both language extensions and optimization can have their merit also in safety related development when weighed against alternatives that require you to, for example, implement complex functionality in assembly language or increase the clock frequency to meet real-time deadlines. As long as you have solid justification for your decision backed up with matching validation and verification activities you re on solid ground. The safety manual and other documentation gives you all the information you need to help you make an informed decision if the need arises. But how can, for example, the use of language extensions be justified and why would I need them for development? The main reason for using language extensions is to use extensions that in some way let me access special features of the underlying hardware in a type safe way and without the need to write assembly language glue code or rely on strange pre-processor magic. Such extensions can be very general, like operator used by IAR Systems compilers to indicate that a certain object shall be absolutely placed at a certain address. This can be used to safely create symbolic names for memory mapped peripherals, like timers, I/O ports etc; and this will in turn enable the linker to make sure that mapped objects do not overlap. More specific extensions are various intrinsic functions to access special features of the CPU core, like disable_interrupt() or the RX specific RMPA_B() that inserts a special instruction into the instruction stream in safe way. Optimization is another interesting area. Considerable effort goes into making modern compilers do their very best both on typical application code as well as on specific benchmarks; a modern highly optimizing compiler can perform some really amazing tricks with your code. At the same time, a buyer often spends quite a lot of time evaluating the performance of a compiler and associated tools. When the chosen compiler is then used in a project with safety requirements, the optimizations are most often simply turned off This might look slightly weird seen from above, but there are some highly relevant drivers for this: Safety standards commonly advice against using optimizations And if your project aims for certification it s always your assessor or notified body that have the final saying on what s acceptable. Use of very aggressive optimizations on a whole application can severely degrade the traceability from source code to assembly language After function inlining, loop unrolling, instruction scheduling, common sub-expression elimination and a bunch of other transformations have been applied to a program it can be very difficult and error prone to manually map a specific piece of source code to the resulting assembly code, let alone proving that the code is implementing the right piece of functionality. Traceability requirements can be an efficient blocker of wholesale optimization.

5 Page 5 Concern about faulty implementations. Unfortunately, C compilers historically have a rather sad track record of implementing complex optimizations as well as not taking the language standards too seriously. The situation is dramatically different today. But combining several very aggressive optimizations and unleashing them on large code bases definitely increases the probability to encounter problems. Perceived quality issues with optimizations. This is a tricky one A quite common scenario for us is to get a bug report on some optimization that is believed to be wrong where it turns out that the code that broke is really relying on behavior that is undefined by the language standard and the compiler exploited the fact that the source code is, in a sense, broken. What s difficult with this kind of problem is that the code might have worked as expected for a long time and then suddenly breaks after a modification that triggers different optimization behavior. Further, it might be a chain of triggering optimizations that leads up to the problem, which can make it hard to find the spot in the source that s causing the problem. So, given that there are valid arguments to go easy on the optimization, what can we do when we really need them? Let s start from the bottom of the list. The best way to avoid relying on undefined behavior is to adhere as strictly as possible to a coding standard like MISRA C or another standard with similar intent. This is already close to mandatory if you are working against IEC 61508, so this is really no additional work you do just for the benefit of correct optimizations. However, strict adherence to such coding standards requires tool support in the form of static analysis tools to be viable. But the benefits of keeping the code MISRA clean are so many, that it s really worth considering using MISRA as a basis for your work even if you re currently not under safety requirements. Of course any standard that enforces a similar subset of the language can be used, but MISRA C is the most widespread standardized subset around. So, what about traceability? First, an assessment should be made where potential performance bottlenecks are identified. In this scenario, code size of one or more modules can also be viewed as a performance bottleneck if they force the inclusion of more code memory in the HW design, which in turn can force a reevaluation of safety requirements etc. If the performance issues can be isolated to just a few places various techniques can be used to keep traceability on workable levels. This leads over to the last issue, since the techniques are very similar. No matter if you want to increase traceability to, and understandability of, object code or reduce the risk of running into unexpected optimization issues, there are a few techniques that can be used: o Most compilers have a notion of optimization levels. Three levels divided in to low, medium and high optimizations are very common. Another commonality is that the trickiest optimizations are almost always reserved for the highest level. Depending on the exact traceability and verification requirements you have, you can ponder the following techniques. Can I increase the optimization level on only the modules that are perceived as slow/big? How is performance and traceability affected by this? Maybe an even higher level works, but this must always be assessed thoroughly against all other requirements. It is also often possible to turn off some specific optimization. o o If needed, break out functions and put them in separate modules to isolate optimizations even further. When optimizations are used, no matter if the level is low or high, is used only on certain modules, or across the full application, you should consider how you test the application. As soon as optimizations are used you should run as much as possible of your tests with both optimized and non-optimized builds. This way you ensure that the code behaves the same in both versions. Further, as a complement to what we talked about above, this way of testing is an excellent way to further reduce accidental dependencies on undefined behavior. This is especially so, if you can complement your test configurations with a build where all optimizations are turned on. A good thing with optimizations, as seen from a quality perspective, is that they reduce the amount of object code that might potentially have to be verified and cross-referenced. How much verification that is

6 Page 6 done on this level depends on your safety goals, but for certain projects this can be a heavy burden. Usually, letting the optimizer work on the low level removes a lot of code that is just translation artifacts but retains a very good coupling with the original source code, thus actually simplifying ocular inspection. 7. Say what? So, what do you get if you select the functional safety version of IAR Embedded Workbench for Renesas RX? The high-level benefits can be summarized as follows: A complete build chain and development environment that is certified by TÜV SÜD to comply with the requirements for tools selection in IEC and ISO A report to accompany the certificate stating under what circumstances the certificate is valid. A safety manual and general documentation that gives in-detail knowledge of how the tools should be used and their functional boundaries. A test report on how the tool set is tested. A compiler that accepts the C89, C99 and C++ languages. Exceptions and RTTI are not supported for C++, which in the case of exceptions is just as well, since their usage is not recommended for safety related development. A Functional Safety Support and Update Agreement that includes support and prequalified bug fix updates to the certified version for as long as there are customers under contract for that version. Regular updates on newly-discovered problems in the toolchain. The combination of Renesas Electronics functional safety package for the selected RX families and IAR Embedded Workbench for Renesas RX gives you a head start for developing safety critical products and applications and removes much of the drudgery that isn t directly related to developing your application. Additionally, it gives you a compiler with outstanding optimization performance and best-inclass language conformance. On top of that it also provides various language extensions that can optionally be turned on to simplify programming close to the hardware. This includes intrinsic functions to access special hardware features as well as extensions to simplify access to memory-mapped peripheral devices.

How Safe does my Code Need to be? Shawn A. Prestridge, Senior Field Applications Engineer

How Safe does my Code Need to be? Shawn A. Prestridge, Senior Field Applications Engineer How Safe does my Code Need to be? Shawn A. Prestridge, Senior Field Applications Engineer Agendum What the benefits of Functional Safety are What the most popular safety certifications are Why you should

More information

IBM Rational Rhapsody

IBM Rational Rhapsody IBM Rational Rhapsody IBM Rational Rhapsody Reference Workflow Guide Version 1.9 License Agreement No part of this publication may be reproduced, transmitted, stored in a retrieval system, nor translated

More information

Seven Practical Steps to Delivering More Secure Software. January 2011

Seven Practical Steps to Delivering More Secure Software. January 2011 Seven Practical Steps to Delivering More Secure Software January 2011 Table of Contents Actions You Can Take Today 3 Delivering More Secure Code: The Seven Steps 4 Step 1: Quick Evaluation and Plan 5 Step

More information

Embedded Software development Process and Tools:

Embedded Software development Process and Tools: Embedded Software development Process and Tools: Lesson-2 Integrated Development Environment (IDE) 1 1. IDE 2 Consists of Simulators editors, compilers, assemblers, etc., IDE 3 emulators logic analyzers

More information

TÜ V Rheinland Industrie Service

TÜ V Rheinland Industrie Service TÜ V Rheinland Industrie Service Business Area: Automation / Functional Safety Contact Minsung Lee +82-2-860-9969 mailto : minsung.lee@kor.tuv.com Sales Account Manager for Functional Safety Fax +82-2-860-9862

More information

AC 20-148 REUSABLE SOFTWARE COMPONENTS

AC 20-148 REUSABLE SOFTWARE COMPONENTS AC 20-148 REUSABLE SOFTWARE COMPONENTS December 7, 2004 12/7/04 AC 20-148 CONTENTS Paragraph Title Page 1. Purpose....1 2. Motivation for this Guidance....1 3. Document Overview...1 4. General Guidelines

More information

EMV Migration and Certification in the U.S. UL's View on Optimizing EMV Brand Certification Processes

EMV Migration and Certification in the U.S. UL's View on Optimizing EMV Brand Certification Processes EMV Migration and Certification in the U.S. UL's View on Optimizing EMV Brand Certification Processes EMV Migration and Certification in the U.S. UL's View on Optimizing EMV Brand Certification Processes

More information

Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process

Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process By Andreas Lindenthal and Franz Walkembach, Wind River The concept of autonomous vehicles or unmanned

More information

The top 10 misconceptions about performance and availability monitoring

The top 10 misconceptions about performance and availability monitoring The top 10 misconceptions about performance and availability monitoring Table of contents Introduction................................................................ 3 The top 10 misconceptions about

More information

Software Production. Industrialized integration and validation of TargetLink models for series production

Software Production. Industrialized integration and validation of TargetLink models for series production PAGE 24 EB AUTOMOTIVE Industrialized integration and validation of TargetLink models for series production Continuous Software Production The complexity of software systems in vehicles is increasing at

More information

IEC 61508 Functional Safety Assessment. Project: K-TEK Corporation AT100, AT100S, AT200 Magnetostrictive Level Transmitter.

IEC 61508 Functional Safety Assessment. Project: K-TEK Corporation AT100, AT100S, AT200 Magnetostrictive Level Transmitter. 61508 SIL 3 CAPABLE IEC 61508 Functional Safety Assessment Project: K-TEK Corporation AT100, AT100S, AT200 Magnetostrictive Level Transmitter Customer: K-TEK Corporation Prairieville, LA USA Contract No.:

More information

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded

More information

Software in safety critical systems

Software in safety critical systems Software in safety critical systems Software safety requirements Software safety integrity Budapest University of Technology and Economics Department of Measurement and Information Systems Definitions

More information

Effective Software Verification for Medical Devices

Effective Software Verification for Medical Devices STERLINGTECH AND KLOCWORK WHITE PAPER NOVEMBER 2009 Effective Software Verification for Medical Devices Achieving compliance and meeting productivity goals with static analysis In addition to producing

More information

Virtual Platforms Addressing challenges in telecom product development

Virtual Platforms Addressing challenges in telecom product development white paper Virtual Platforms Addressing challenges in telecom product development This page is intentionally left blank. EXECUTIVE SUMMARY Telecom Equipment Manufacturers (TEMs) are currently facing numerous

More information

White Paper by Hannah Kain, CEO, ALOM. Avoid The Unit Cost Trap

White Paper by Hannah Kain, CEO, ALOM. Avoid The Unit Cost Trap White Paper by Hannah Kain, CEO, ALOM Avoid The Unit Cost Trap Summary When researching a fulfillment and supply chain vendor, many companies put themselves at risk by focusing only on the easy-to-compare

More information

Reducing Steps to Achieve Safety Certification

Reducing Steps to Achieve Safety Certification Reducing Steps to Achieve Safety Certification WP-01174-1.0 White Paper This white paper describes the successful steps in achieving certification for an FPGA implementation of an application certified

More information

Design of automatic testing tool for railway signalling systems software safety assessment

Design of automatic testing tool for railway signalling systems software safety assessment Risk Analysis VI 513 Design of automatic testing tool for railway signalling systems software safety assessment J.-G. Hwang 1, H.-J. Jo 1 & H.-S. Kim 2 1 Train Control Research Team, Korea Railroad Research

More information

Testing of safety-critical software some principles

Testing of safety-critical software some principles 1(60) Testing of safety-critical software some principles Emerging Trends in Software Testing: autumn 2012 Matti Vuori, Tampere University of Technology 27.11.2012 Contents 1/4 Topics of this lecture 6

More information

Safety Issues in Automotive Software

Safety Issues in Automotive Software Safety Issues in Automotive Software Paolo Panaroni, Giovanni Sartori INTECS S.p.A. SAFEWARE 1 INTECS & Safety A very large number of safety software development, V&V activities and research project on

More information

FIREWALL CLEANUP WHITE PAPER

FIREWALL CLEANUP WHITE PAPER FIREWALL CLEANUP WHITE PAPER Firewall Cleanup Recommendations Considerations for Improved Firewall Efficiency, Better Security, and Reduced Policy Complexity Table of Contents Executive Summary... 3 The

More information

3. Programming the STM32F4-Discovery

3. Programming the STM32F4-Discovery 1 3. Programming the STM32F4-Discovery The programming environment including the settings for compiling and programming are described. 3.1. Hardware - The programming interface A program for a microcontroller

More information

Test Driven Development of Embedded Systems Using Existing Software Test Infrastructure

Test Driven Development of Embedded Systems Using Existing Software Test Infrastructure Test Driven Development of Embedded Systems Using Existing Software Test Infrastructure Micah Dowty University of Colorado at Boulder micah@navi.cx March 26, 2004 Abstract Traditional software development

More information

Process Intelligence: An Exciting New Frontier for Business Intelligence

Process Intelligence: An Exciting New Frontier for Business Intelligence February/2014 Process Intelligence: An Exciting New Frontier for Business Intelligence Claudia Imhoff, Ph.D. Sponsored by Altosoft, A Kofax Company Table of Contents Introduction... 1 Use Cases... 2 Business

More information

Notes and terms of conditions. Vendor shall note the following terms and conditions/ information before they submit their quote.

Notes and terms of conditions. Vendor shall note the following terms and conditions/ information before they submit their quote. Specifications for ARINC 653 compliant RTOS & Development Environment Notes and terms of conditions Vendor shall note the following terms and conditions/ information before they submit their quote. 1.

More information

ELECTROTECHNIQUE IEC INTERNATIONALE 61508-3 INTERNATIONAL ELECTROTECHNICAL

ELECTROTECHNIQUE IEC INTERNATIONALE 61508-3 INTERNATIONAL ELECTROTECHNICAL 61508-3 ª IEC: 1997 1 Version 12.0 05/12/97 COMMISSION CEI ELECTROTECHNIQUE IEC INTERNATIONALE 61508-3 INTERNATIONAL ELECTROTECHNICAL COMMISSION Functional safety of electrical/electronic/ programmable

More information

Software Engineering Introduction & Background. Complaints. General Problems. Department of Computer Science Kent State University

Software Engineering Introduction & Background. Complaints. General Problems. Department of Computer Science Kent State University Software Engineering Introduction & Background Department of Computer Science Kent State University Complaints Software production is often done by amateurs Software development is done by tinkering or

More information

How to Upgrade SPICE-Compliant Processes for Functional Safety

How to Upgrade SPICE-Compliant Processes for Functional Safety How to Upgrade SPICE-Compliant Processes for Functional Safety Dr. Erwin Petry KUGLER MAAG CIE GmbH Leibnizstraße 11 70806 Kornwestheim Germany Mobile: +49 173 67 87 337 Tel: +49 7154-1796-222 Fax: +49

More information

Lab 1 Course Guideline and Review

Lab 1 Course Guideline and Review Lab 1 Course Guideline and Review Overview Welcome to ECE 3567 Introduction to Microcontroller Lab. In this lab we are going to experimentally explore various useful peripherals of a modern microcontroller

More information

How To Choose the Right Vendor Information you need to select the IT Security Testing vendor that is right for you.

How To Choose the Right Vendor Information you need to select the IT Security Testing vendor that is right for you. Information you need to select the IT Security Testing vendor that is right for you. Netragard, Inc Main: 617-934- 0269 Email: sales@netragard.com Website: http://www.netragard.com Blog: http://pentest.netragard.com

More information

Introduction of ISO/DIS 26262 (ISO 26262) Parts of ISO 26262 ASIL Levels Part 6 : Product Development Software Level

Introduction of ISO/DIS 26262 (ISO 26262) Parts of ISO 26262 ASIL Levels Part 6 : Product Development Software Level ISO 26262 the Emerging Automotive Safety Standard Agenda Introduction of ISO/DIS 26262 (ISO 26262) Parts of ISO 26262 ASIL Levels Part 4 : Product Development System Level Part 6 : Product Development

More information

OpenGL ES Safety-Critical Profile Philosophy

OpenGL ES Safety-Critical Profile Philosophy OpenGL ES Safety-Critical Profile Philosophy Claude Knaus July 5th, 2004 OpenGL is a registered trademark, and OpenGL ES is a trademark, of Silicon Graphics, Inc. 1 1 Overview The Safety-Critical profile

More information

Product Information Services for Embedded Software

Product Information Services for Embedded Software Product Information Services for Embedded Software Table of Contents 1 Technical Consulting/Engineering Services... 3 1.1 Overview of Advantages... 3 1.2 Application Areas... 3 2 Product- Services - Proficient

More information

find model parameters, to validate models, and to develop inputs for models. c 1994 Raj Jain 7.1

find model parameters, to validate models, and to develop inputs for models. c 1994 Raj Jain 7.1 Monitors Monitor: A tool used to observe the activities on a system. Usage: A system programmer may use a monitor to improve software performance. Find frequently used segments of the software. A systems

More information

Vetting Smart Instruments for the Nuclear Industry

Vetting Smart Instruments for the Nuclear Industry TS Lockhart, Director of Engineering Moore Industries-International, Inc. Vetting Smart Instruments for the Nuclear Industry Moore Industries-International, Inc. is a world leader in the design and manufacture

More information

Maturity, motivation and effective learning in projects - benefits from using industrial clients

Maturity, motivation and effective learning in projects - benefits from using industrial clients Maturity, motivation and effective learning in projects - benefits from using industrial clients C Johansson Ericsson Software Technology AB/University of Karlskrona/Ronneby P Molin University of Karlskrona/Ronneby,

More information

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE, AND AGING

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE, AND AGING COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE, AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Defect Management and Reporting Domain: Application Domain Date Issued:

More information

The ROI of Test Automation

The ROI of Test Automation The ROI of Test Automation by Michael Kelly www.michaeldkelly.com Introduction With the exception of my first project team out of college, in every project team since, I ve had to explain either what automated

More information

SOFTWARE PERFORMANCE TESTING SERVICE

SOFTWARE PERFORMANCE TESTING SERVICE SOFTWARE PERFORMANCE TESTING SERVICE Service Definition GTS s performance testing services allows customers to reduce the risk of poor application performance. This is done by performance testing applications

More information

Using Linux in Medical Devices: What Developers and

Using Linux in Medical Devices: What Developers and Using Linux in Medical Devices: What Developers and Manufacturers Need to Know By Ken Herold, Engineering Specialist, Wind River INNOVATORS START HERE. EXECUTIVE Overview Linux is the operating system

More information

TESSY Automated dynamic module/unit and. CTE Classification Tree Editor. integration testing of embedded applications. for test case specifications

TESSY Automated dynamic module/unit and. CTE Classification Tree Editor. integration testing of embedded applications. for test case specifications TESSY Automated dynamic module/unit and integration testing of embedded applications CTE Classification Tree Editor for test case specifications Automated module/unit testing and debugging at its best

More information

Reduce Medical Device Compliance Costs with Best Practices. mark.pitchford@ldra.com

Reduce Medical Device Compliance Costs with Best Practices. mark.pitchford@ldra.com Reduce Medical Device Compliance Costs with Best Practices mark.pitchford@ldra.com 1 Agenda Medical Software Certification How new is Critical Software Certification? What do we need to do? What Best Practises

More information

State of Medical Device Development. 2014 State of Medical Device Development seapine.com 1

State of Medical Device Development. 2014 State of Medical Device Development seapine.com 1 State of Medical Device Development 2014 2014 State of Medical Device Development seapine.com 1 Executive Summary The demand for smarter, safer, more connected medical devices has introduced new complexities

More information

Methods Commission CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS. 30, rue Pierre Semard, 75009 PARIS

Methods Commission CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS. 30, rue Pierre Semard, 75009 PARIS MEHARI 2007 Overview Methods Commission Mehari is a trademark registered by the Clusif CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS 30, rue Pierre Semard, 75009 PARIS Tél.: +33 153 25 08 80 - Fax: +33

More information

Software: Driving Innovation for Engineered Products

Software: Driving Innovation for Engineered Products Software: Driving Innovation for Engineered Products Software in products holds the key to innovations that improve quality, safety, and ease-of-use, as well as add new functions. Software simply makes

More information

Software testing. Objectives

Software testing. Objectives Software testing cmsc435-1 Objectives To discuss the distinctions between validation testing and defect testing To describe the principles of system and component testing To describe strategies for generating

More information

JOURNAL OF OBJECT TECHNOLOGY

JOURNAL OF OBJECT TECHNOLOGY JOURNAL OF OBJECT TECHNOLOGY Online at http://www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2006 Vol. 5, No. 6, July - August 2006 On Assuring Software Quality and Curbing Software

More information

(Refer Slide Time: 01:52)

(Refer Slide Time: 01:52) Software Engineering Prof. N. L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture - 2 Introduction to Software Engineering Challenges, Process Models etc (Part 2) This

More information

Certification Authorities Software Team (CAST) Position Paper CAST-13

Certification Authorities Software Team (CAST) Position Paper CAST-13 Certification Authorities Software Team (CAST) Position Paper CAST-13 Automatic Code Generation Tools Development Assurance Completed June 2002 NOTE: This position paper has been coordinated among the

More information

WIND RIVER DIAB COMPILER

WIND RIVER DIAB COMPILER AN INTEL COMPANY WIND RIVER DIAB COMPILER Boost application performance, reduce memory footprint, and produce high-quality, standards-compliant object code for embedded systems with Wind River Diab Compiler.

More information

Procuring Penetration Testing Services

Procuring Penetration Testing Services Procuring Penetration Testing Services Introduction Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat

More information

We drive Aurix to success Aurix Services for Automotive & Industrial

We drive Aurix to success Aurix Services for Automotive & Industrial Building a safe and secure embedded world We drive Aurix to success Aurix Services for Automotive & Industrial > Services HITEX: An Preferred Design House (PDH) Questions about? Ask us Aurix Services for

More information

functional Safety UL Functional Safety Mark

functional Safety UL Functional Safety Mark functional Safety UL Functional Safety Mark Program UL Functional Safety Mark Program With the advent and evolution of functional safety standards in North America and Europe, UL is now offering a UL Functional

More information

THE EVOLUTION OF TV. The Promise of Programmatic TV

THE EVOLUTION OF TV. The Promise of Programmatic TV 3 THE EVOLUTION OF TV The Promise of Programmatic TV Our Evolution of TV series explores how TV is shifting to internet delivery. Programmatic TV is one dynamic driving the shift and potentially transforming

More information

Software: Driving Innovation for Engineered Products. Page

Software: Driving Innovation for Engineered Products. Page Software: Driving Innovation for Engineered Products Software in products holds the key to innovations that improve quality, safety, and ease-of-use, as well as add new functions. Software simply makes

More information

3 Email Marketing Security Risks. How to combat the threats to the security of your Email Marketing Database

3 Email Marketing Security Risks. How to combat the threats to the security of your Email Marketing Database 3 Email Marketing Security Risks How to combat the threats to the security of your Email Marketing Database Email Marketing Guide June 2013 Security Threats PROTECTING YOUR EMAIL DATABASE FROM HACKERS

More information

Quality Management Systems. Compliance Driven or Quality Driven?

Quality Management Systems. Compliance Driven or Quality Driven? Quality Management Systems Compliance Driven or Quality Driven? Written by N. Richard Puglielli Page 1 of 7 Overview ISO standards have been around for quite some time now and the concept behind these

More information

Achieving business benefits through automated software testing. By Dr. Mike Bartley, Founder and CEO, TVS (mike@testandverification.

Achieving business benefits through automated software testing. By Dr. Mike Bartley, Founder and CEO, TVS (mike@testandverification. Achieving business benefits through automated software testing By Dr. Mike Bartley, Founder and CEO, TVS (mike@testandverification.com) 1 Introduction During my experience of test automation I have seen

More information

Certification of a Scade 6 compiler

Certification of a Scade 6 compiler Certification of a Scade 6 compiler F-X Fornari Esterel Technologies 1 Introduction Topic : What does mean developping a certified software? In particular, using embedded sofware development rules! What

More information

SKP16C62P Tutorial 1 Software Development Process using HEW. Renesas Technology America Inc.

SKP16C62P Tutorial 1 Software Development Process using HEW. Renesas Technology America Inc. SKP16C62P Tutorial 1 Software Development Process using HEW Renesas Technology America Inc. 1 Overview The following tutorial is a brief introduction on how to develop and debug programs using HEW (Highperformance

More information

The Proven ROI of Development Testing: An in-depth analysis of Coverity customer experiences

The Proven ROI of Development Testing: An in-depth analysis of Coverity customer experiences The Proven ROI of Development Testing: An in-depth analysis of Coverity customer experiences Introduction Any development organization that is serious about software quality immediately sees the benefits

More information

Software Development for Medical Devices

Software Development for Medical Devices Overcoming the Challenges of Compliance, Quality and Cost An MKS White Paper Introduction Software is fast becoming the differentiator for manufacturers of medical devices. The rewards available from software

More information

Development of AUTOSAR Software Components within Model-Based Design

Development of AUTOSAR Software Components within Model-Based Design 2008-01-0383 Development of AUTOSAR Software Components within Model-Based Design Copyright 2008 The MathWorks, Inc. Guido Sandmann Automotive Marketing Manager, EMEA The MathWorks Richard Thompson Senior

More information

Rigorous Methods for Software Engineering (F21RS1) High Integrity Software Development

Rigorous Methods for Software Engineering (F21RS1) High Integrity Software Development Rigorous Methods for Software Engineering (F21RS1) High Integrity Software Development Andrew Ireland Department of Computer Science School of Mathematical and Computer Sciences Heriot-Watt University

More information

Revision History Revision Date 3.0 14.02.10. Changes Initial version published to http://www.isasecure.org

Revision History Revision Date 3.0 14.02.10. Changes Initial version published to http://www.isasecure.org SDLA-312 ISA Security Compliance Institute Security Development Lifecycle Assurance - Security Development Lifecycle Assessment v3.0 Lifecycle Phases Number Phase Name Description PH1 Security Management

More information

VELOCITY LAB TM Embedded Development Ecosystem

VELOCITY LAB TM Embedded Development Ecosystem VELOCITY LAB TM Embedded Development Ecosystem 0C05B Renesas Electronics America Inc. Renesas Technology & Solution Portfolio 2 Microcontroller and Microprocessor Line-up 2010 2013 32-bit 8/16-bit 1200

More information

Certification Authorities Software Team (CAST) Position Paper CAST-26

Certification Authorities Software Team (CAST) Position Paper CAST-26 Certification Authorities Software Team (CAST) Position Paper CAST-26 VERIFICATION INDEPENDENCE COMPLETED January 2006 (Rev 0) NOTE: This position paper has been coordinated among the software specialists

More information

Research Data Management CODING

Research Data Management CODING CODING Coding When writing software or analytical code it is important that others and your future self can understand what the code is doing. published 10 steps that they regard as the Best Practices

More information

4 Critical Risks Facing Microsoft Office 365 Implementation

4 Critical Risks Facing Microsoft Office 365 Implementation 4 Critical Risks Facing Microsoft Office 365 Implementation So, your organization has chosen to move to Office 365. Good choice. But how do you implement it AND deal with the following issues: Keep email

More information

Operating Systems. Notice that, before you can run programs that you write in JavaScript, you need to jump through a few hoops first

Operating Systems. Notice that, before you can run programs that you write in JavaScript, you need to jump through a few hoops first Operating Systems Notice that, before you can run programs that you write in JavaScript, you need to jump through a few hoops first JavaScript interpreter Web browser menu / icon / dock??? login??? CPU,

More information

Effective Software Security Management

Effective Software Security Management Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta dharmeshmm@mastek.com / dharmeshmm@owasp.org Table of Contents Abstract... 1

More information

Selecting Sensors for Safety Instrumented Systems per IEC 61511 (ISA 84.00.01 2004)

Selecting Sensors for Safety Instrumented Systems per IEC 61511 (ISA 84.00.01 2004) Selecting Sensors for Safety Instrumented Systems per IEC 61511 (ISA 84.00.01 2004) Dale Perry Worldwide Pressure Marketing Manager Emerson Process Management Rosemount Division Chanhassen, MN 55317 USA

More information

Plug. & Play. Various ECUs tested by automated sequences. dspace Magazine 3/2009 dspace GmbH, Paderborn, Germany info@dspace.com www.dspace.

Plug. & Play. Various ECUs tested by automated sequences. dspace Magazine 3/2009 dspace GmbH, Paderborn, Germany info@dspace.com www.dspace. page 34 Delphi Diesel systems Plug & Play Various ECUs tested by automated sequences page 35 Delphi Diesel Systems has successfully developed automated integration and feature tests for various ECUs for

More information

Table of contents. Best practices in open source governance. Managing the selection and proliferation of open source software across your enterprise

Table of contents. Best practices in open source governance. Managing the selection and proliferation of open source software across your enterprise Best practices in open source governance Managing the selection and proliferation of open source software across your enterprise Table of contents The importance of open source governance... 2 Executive

More information

Version: 1.0 Latest Edition: 2006-08-24. Guideline

Version: 1.0 Latest Edition: 2006-08-24. Guideline Management of Comments on this report are gratefully received by Johan Hedberg at SP Swedish National Testing and Research Institute mailto:johan.hedberg@sp.se Quoting of this report is allowed but please

More information

HMS Industrial Networks

HMS Industrial Networks HMS Industrial Networks The guide to connecting automation devices to industrial networks Whitepaper Five ways to connect devices to fieldbus and industrial networks. HMS Industrial Networks AB Stationsgatan

More information

Verification and Validation of Software Components and Component Based Software Systems

Verification and Validation of Software Components and Component Based Software Systems Chapter 5 29 Verification and Validation of Software Components and Component Based Christina Wallin Industrial Information Technology Software Engineering Processes ABB Corporate Research christina.wallin@mdh.se

More information

Digital Continuity in ICT Services Procurement and Contract Management

Digital Continuity in ICT Services Procurement and Contract Management Digital Continuity in ICT Services Procurement and Contract Management This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage

More information

A better way to calculate equipment ROI

A better way to calculate equipment ROI page 1 A better way to calculate equipment ROI a West Monroe Partners white paper by Aaron Lininger Copyright 2012 by CSCMP s Supply Chain Quarterly (www.supplychainquarterly.com), a division of Supply

More information

Case Study: Load Testing and Tuning to Improve SharePoint Website Performance

Case Study: Load Testing and Tuning to Improve SharePoint Website Performance Case Study: Load Testing and Tuning to Improve SharePoint Website Performance Abstract: Initial load tests revealed that the capacity of a customized Microsoft Office SharePoint Server (MOSS) website cluster

More information

Continuous Integration Build-Test-Delivery (CI-BTD) Framework in compliance with ISO26262

Continuous Integration Build-Test-Delivery (CI-BTD) Framework in compliance with ISO26262 Continuous Integration Build-Test-Delivery (CI-BTD) Framework in compliance with ISO26262 Manish Patil Sathishkumar T September 2015 1 Contents Abstract... 3 1. Introduction... 3 2. Industry Challenges...

More information

Network Configuration Management

Network Configuration Management Network Configuration Management Contents Abstract Best Practices for Configuration Management What is Configuration Management? FCAPS Configuration Management Operational Issues IT Infrastructure Library

More information

Real-Time Systems Prof. Dr. Rajib Mall Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Real-Time Systems Prof. Dr. Rajib Mall Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Real-Time Systems Prof. Dr. Rajib Mall Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 26 Real - Time POSIX. (Contd.) Ok Good morning, so let us get

More information

Capacity planning with Microsoft System Center

Capacity planning with Microsoft System Center Capacity planning with Microsoft System Center Mike Resseler Veeam Product Strategy Specialist, MVP, Microsoft Certified IT Professional, MCSA, MCTS, MCP Modern Data Protection Built for Virtualization

More information

SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT

SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT Mar 31, 2014 Japan Aerospace Exploration Agency This is an English translation of JERG-2-610. Whenever there is anything ambiguous in this document, the original

More information

A deeper look at Inline functions

A deeper look at Inline functions A deeper look at Inline functions I think it s safe to say that all Overload readers know what C++ inline functions are. When we declare a function or member function as inline we are trying to avoid the

More information

Enova X-Wall LX Frequently Asked Questions

Enova X-Wall LX Frequently Asked Questions Enova X-Wall LX Frequently Asked Questions Q: What is X-Wall LX? A: X-Wall LX is the third generation of Enova real-time hard drive cryptographic gateway ASIC (Application Specific Integrated Circuit)

More information

Outlook Safe Sender s Filtering

Outlook Safe Sender s Filtering Outlook Safe Sender s Filtering User s Guide Also Guide to Making Internet Explorer More Secure By: Gregg Sterner Trellix Engineering Corp. Table of Contents Introduction... 1 This Manual... 3 Junk E-mail

More information

Will Dormann: Sure. Fuzz testing is a way of testing an application in a way that you want to actually break the program.

Will Dormann: Sure. Fuzz testing is a way of testing an application in a way that you want to actually break the program. The Power of Fuzz Testing to Reduce Security Vulnerabilities Transcript Part 1: Why Fuzz Testing? Julia Allen: Welcome to CERT's podcast series: Security for Business Leaders. The CERT program is part

More information

The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.

The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems. 1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood

More information

Professional Services Organizations (PSO) Need Professional Services Automation (PSA)

Professional Services Organizations (PSO) Need Professional Services Automation (PSA) RTM Consulting Professional Services Organizations (PSO) Need Professional Services Automation (PSA) PSOs Eat Your Own Dog Food Randy Mysliviec President & CEO 1-855-786-2555 RTM Consulting 2 2007-2015

More information

Network Security: Policies and Guidelines for Effective Network Management

Network Security: Policies and Guidelines for Effective Network Management Network Security: Policies and Guidelines for Effective Network Management Department of Electrical and Computer Engineering, Federal University of Technology, Minna, Nigeria. jgkolo@gmail.com, usdauda@gmail.com

More information

CP14 ISSUE 5 DATED 1 st OCTOBER 2015 BINDT Audit Procedure Conformity Assessment and Certification/Verification of Management Systems

CP14 ISSUE 5 DATED 1 st OCTOBER 2015 BINDT Audit Procedure Conformity Assessment and Certification/Verification of Management Systems Certification Services Division Newton Building, St George s Avenue Northampton, NN2 6JB United Kingdom Tel: +44(0)1604-893-811. Fax: +44(0)1604-893-868. E-mail: pcn@bindt.org CP14 ISSUE 5 DATED 1 st OCTOBER

More information

BY STEVE BROWN, CADENCE DESIGN SYSTEMS AND MICHEL GENARD, VIRTUTECH

BY STEVE BROWN, CADENCE DESIGN SYSTEMS AND MICHEL GENARD, VIRTUTECH WHITE PAPER METRIC-DRIVEN VERIFICATION ENSURES SOFTWARE DEVELOPMENT QUALITY BY STEVE BROWN, CADENCE DESIGN SYSTEMS AND MICHEL GENARD, VIRTUTECH INTRODUCTION The complexity of electronic systems is rapidly

More information

Chap 1. Software Quality Management

Chap 1. Software Quality Management Chap 1. Software Quality Management Part 1.1 Quality Assurance and Standards Part 1.2 Software Review and Inspection Part 1.3 Software Measurement and Metrics 1 Part 1.1 Quality Assurance and Standards

More information

Operating Systems 4 th Class

Operating Systems 4 th Class Operating Systems 4 th Class Lecture 1 Operating Systems Operating systems are essential part of any computer system. Therefore, a course in operating systems is an essential part of any computer science

More information

10g versions followed on separate paths due to different approaches, but mainly due to differences in technology that were known to be huge.

10g versions followed on separate paths due to different approaches, but mainly due to differences in technology that were known to be huge. Oracle BPM 11g Platform Analysis May 2010 I was privileged to be invited to participate in "EMEA BPM 11g beta bootcamp" in April 2010, where I had close contact with the latest release of Oracle BPM 11g.

More information

Fondamenti su strumenti di sviluppo per microcontrollori PIC

Fondamenti su strumenti di sviluppo per microcontrollori PIC Fondamenti su strumenti di sviluppo per microcontrollori PIC MPSIM ICE 2000 ICD 2 REAL ICE PICSTART Ad uso interno del corso Elettronica e Telecomunicazioni 1 2 MPLAB SIM /1 MPLAB SIM is a discrete-event

More information

The Dirty Little Secret of Software Pricing

The Dirty Little Secret of Software Pricing WHITEPAPER The Dirty Little Secret of Software Pricing Stan Schneider Mr. Customer, our price is $13,349 dollars per floating development seat. Larger teams need more support, so we charge 20% maintenance

More information

IBM Rational systems and software solutions for the medical device industry

IBM Rational systems and software solutions for the medical device industry IBM Software August 2011 IBM Rational systems and software solutions for the medical device industry Improve processes, manage IEC 61508 and IEC 62304 standards, develop quality products Highlights Manage

More information