ISO Tool Chain Analysis Reduces Tool Qualification Costs
|
|
|
- Milo McCormick
- 10 years ago
- Views:
Transcription
1 ISO Tool Chain Analysis Reduces Tool Qualification Costs Oscar Slotosch, Martin Wildmoser, Jan Philipps, Reinhard Jeschull Validas AG München <surname>@validas.de Rafael Zalman Infineon Technologies AG Neubiberg [email protected] Abstract: Software tools in safety related projects are indispensable, but also introduce risks. A tool error may lead to the injection or non-detection of a fault in the product. For this reason the safety norm for road vehicles, ISO 26262, requires determination of a tool confidence level for each software tool. In this paper we present a model-based approach to represent a tool chain, its potential errors and the counter-measures for these. In this model tools are not only error sources, but can also act as error sinks for other tools by providing appropriate checks and restrictions. The tool work flow in a project can be rearranged or extended to make the integrated tool chain safer than its parts and to reduce tool qualification costs greatly. The tool chain model not only identifies the critical tools, but also exposes very specific qualification requirements for these. The paper illustrates and augments this approach with experiences and results from an application to a real industrial automotive tool chain consisting of 37 tools. 1 Introduction The increasing visibility of development and safety standards such as the ISO is a sign of the growing maturity of the field of embedded software development. Growing maturity of an engineering field is quite naturally accompanied with a stronger emphasis on choice and suitability of tools. While some earlier standards demanded a kind of statement of fitness for use, which was often provided through certification, the ISO takes a more holistic view and demands that tools are evaluated, and if necessary also qualified, in the context of their use in the development tool chain. Thus, tool qualification in ISO [ISO26] is a two-step process. In the first step, tools are evaluated (see Fig 1) to determine a tool confidence level (TCL), based on the tool impact (TI) and on the tool error detection level (TD).
2 Fig 1. Tool evaluation according to ISO 26262: The TI denotes the possibility of tool errors leading to a violation of a safety requirement and the TD expresses the likelihood of detecting or preventing tool errors. In the second step, depending on the TCL and the safety integrity level of the development object, further qualification measures are demanded, such as for instance extensive and focussed tests (tool validation). The safety norm ISO offers the possibility to avoid tool qualification by enriching the development process with additional checks and restrictions in order to detect or prevent all potential tool errors with high probability. With the additional checks and restrictions, the tool confidence level can sometimes be lowered to TCL1, where no tool qualification is needed. In contrast to concrete tool errors, e.g. a bug in function X of tool Y, a potential tool error is a fictive and abstract error of a tool, e.g. loss of data in an output artifact, and denotes something that can go wrong in a tool of a certain type according to Murphy s law. Please also note that we use the term tool error to identify the occurrence of wrong tool behavior in a use case and not its cause, that is a fault or defect in the tool s code. In another paper [WPS12] we further distinguish between tool errors, which are internal to tool, and tool failures, which are external to tool and occur at the output side, according to Laprie s fault/error/failure model [L92], but in this paper we rather only use the term tool error for both in order to be more consistent with the ISO terminology. Tool errors can be mitigated by counter measures in the form of checks or restrictions. A check is a counter measure that detects tool errors after they have occurred, e.g. by inspecting the tool s output artifacts. A restriction is a counter measure that prevents tool errors from occurring, e.g. by limiting the input space or used functions of a tool. Note that we usually cannot detect or prevent the cause of tool errors i.e., tool faults, as this would require measures on the tool s code or in its development process. While there is a certain body of work on tool validation issues [SC04, SS07] and some work on specific tool use patterns to reduce the need of tool validation [Be10], there is so far little work that considers the holistic approach of establishing tool confidence according to ISO A notable exception is [Hi11], where the process of tool evaluation is explained in detail and some practical extensions are proposed. Recently, an increasing emphasis on tool qualification can also be noticed in other safety norms besides the ISO The second edition of IEC [61508], the general safety norm for E/E/P systems, demands all software offline-support tools to be classified in levels T1-T3, but this is done for each tool in isolation and there is no way to
3 avoid qualification of T3 tools. Another example is DO-178C [DO178], the safety norm for the avionic domain, which also has a twofold strategy of first classifying tools in levels TQL1 to TQL5 and then qualifying them by designated activities described in DO- 330 [DO330]. The classification in DO-178C is also based on the possibility of a tool to insert or fail to detect product errors, but is not dependent on the possibility of detecting or avoiding these tool errors elsewhere within the development process. 2 Tool Evaluation Process Tool evaluation is about determining the TCL for all tools used in the development process. Our model-based tool evaluation process consists of the following steps: (a) Model the tool chain with tools, use cases and artifacts. (b) Determine tool impact for every use case (c) Identify potential tool errors for every use case (d) Identify and assign measures for error detection and prevention (e) Validate the model Automated Plausibility Checks Generation of tables for reviewing the tool chain model Rework the model according to the review results (f) Generate a report including the computed tool confidence level for each tool Step (a) results in a model of the tool chain to be analyzed. Before we discuss this model in detail let us look at an example. Assume a tool chain (see Fig 2) for testing product source code, e.g. software modules, with the aim of achieving 100% requirements coverage and 100% MC/DC structural coverage. Our testing tool chain consists of three tools: a test automation tool (TAU), a compiler and an execution platform. The TAU is employed for the use case RunTest, which involves coverage instrumentation, test application generation and the call of other tools, that is compiler and platform, in order to execute a test case. The use case RunTest takes the product source files and a test case definition file (stimuli+references) as input and delivers as output an instrumented version of the product source files and the test application source code, which is the extra code needed for calling the functions to be tested with the inputs specified in the test case definition and to collect and compare the resulting values with the reference values from the test case definition.
4 The TAU calls the use cases CompileApp and LinkApp of the tool Compiler in order to produce the test application binary TestApp ELF and the use case RunApp of the tool Platform to execute the test application binary, e.g. by flashing it to an evaluation board, starting up the application and sending back the results via a communication software, e.g. terminal for COM messages. The test output consists of verdicts of the form PASS or FAIL denoting the result of comparing the actual output values with the corresponding references and the coverage hits denoting the exercised parts of the product source code. The TAU receives these test results from the tool Platform and uses them to produce a summary test report. Fig 2. Example: Testing tool chain, contains some errors without counter measures After the tool chain is modeled the next step (b) is to determine the tool impact for each use case. According to ISO a tool or use case has TI1 if there is no possibility that a potential tool error can lead to the injection or non-detection of a fault in the safetyrelated product, i.e. a violation of a safety requirement. Otherwise, if there is such a possibility or if the question cannot be answered the result is TI2. In step (b) it is not only important to write down the decision (TI1, TI2), but also the reasons for this decisions. For example if a tool has no data flow to the safety related parts of the product and is not used for a verification step, then one can argue that such a tool is TI1. For every use case having TI2 the next step (c) is to determine potential tool errors and then in step (d) to find possible counter measures for these if these exist. In the testing tool chain we can identify several potential tool errors for the use cases, that might lead to the injection or non-detection of product faults. On the other hand there are also several possibilities to detect or avoid these potential errors within these use cases. For example, the compiler may have a defect with leads to the injection of a fault into the product object file. However, this potential error Wrong Product OBJ Code Behaviour of use case CompileApp can very likely be detected by the check Compare Outputs with Reference Values, which is part of the use case RunTest of the tool TAU.
5 However, if a compiler defect hits the test application code, e.g. Wrong TestApp OBJ Code Behaviour in use case CompileApp, the test execution itself might get compromised and a product fault, either injected by a tool defect or manually inserted by the developer, might slip through. Also, if the TAU reports wrong coverage, i.e. potential error Wrong Coverage Reported of use case RunTest, it might not be noticed by the tester that parts of the product code have not been covered by tests and product faults residing in these unexercised parts might slip through. After the tool chain model is adjusted with potential errors and counter measures the next step (d) is to validate this model, that is to check if it resembles correctly and completely the tool chain as it used in the development process and if the modeled errors and counter measures are feasible. In the end of the next section we will show how this step can be assisted with automatic plausibility checks and review tables generated from the model. Once the model is validated the final step (e) is the computation of the TCL for each use case and tool and the generation of a report that contains the resulting TCLs and the way these are derived. 3 Meta Model for Tool Chains To define and analyze tool chains we propose a simple domain specific tool chain model (see Fig 3), which consists of the following elements: Tool Chain, Tool, Use Case, Artifact, Error, Check, Restriction and Qualification. The model shall represent two aspects: the tool chain structure consisting of tools, use cases and artifacts the tool confidence by representing the potential errors and assigned checks or restrictions In the model a tool chain consists of tools, use cases and artifacts. Each tool has its distinct use cases, which describe the purpose for the tool within the project. Each use case has its own sets of artifacts, which are read, written or modified by the use case and can be assigned a TI (TI1, TI2).
6 Fig 3. Domain Model for Tool Chains To model the tool confidence situation each use case is associated with a set of potential errors, which may be assigned to checks or restrictions provided by the same or other use cases possibly from other tools. In our example tool chain (see Fig 2) the potential error Flash Corruption is assigned to the check Memory Checksum Check provided by the same use case RunApp from the tool Platform, i.e. a simulator or a board with corresponding connection software. Each check and restriction has its own effectiveness expressed by the TD level (TD1- TD3). By using TI and TD for all identified potential errors, the TCL for a use case or a tool can be computed automatically according to the ISO table (see Fig 1) by propagating the maximum TD or TCL upwards. Qualifications (including a selectable qualification method) can be added to tool chains, tools and use cases to model available qualifications and to check their compliance with respect to a given ASIL in a tool chain. A more detailed description of the classes, attributes and relations can be found in the user manual of the Tool Chain Analyzer tool [TCA] that has been developed by Validas to support the tool chain modeling (see Fig 4) described here. Building a formal model requires some effort, but it brings the following benefits: Models can be adapted easily, e.g. updating names in a consistent manner Models can be automatically checked for inconsistencies via plausibility checks: o Emptiness checks: Unchecked errors, use cases without errors, unused artifacts
7 o o o Error assignment checks: Without dataflow from use case A to use case B via an artifact, the use case B cannot detect errors of A and A cannot prevent errors in B. This restricts the set of selectable checks/restrictions that can be assigned to an error. Checks for sufficient descriptions: Missing descriptions of elements or missing explanations for high mitigation probabilities or the postulation that a tool has no impact. Checks for existence of adequate qualifications: If in a model all elements with a TCL > 1 have qualifications with appropriate methods (as specified in the ISO tables) for the selected ASIL, then the tool chain is ISO compliant. Models for tools can be easily exchanged and reused, even if the checks and restrictions are distributed on other tools, for example a code generator model which requires some checks of a test tool can be exported including only the required checks. Review of tool chain models is supported by having automatically generated review checklists for tool chains (tool/use case-artifact matrix) and the tool confidence model (list of errors and their assigned counter-measures with TD). Rework and Change-tracking is assisted. The modeler can express the reasons for his/her decisions as comments and mark elements as assumption in order to make clear that these elements express proposals (to be accepted) and not facts (existing checks, restrictions) in the current development process. The modeler can also deactivate elements with the option to restore them later, which allows to analyze the effect of removing a tool to the TCLs of the remaining tools. Automatic generation of reports for model description (text+figures) and the derivation of the TCL for each use case and tool. The report is structured according to the ISO requirements for the work product tool criteria evaluation report. Fig 4. Tool Chain Analyzer with generated figures and tables (MS Word)
8 4 Tool Chain Extensions and Rearrangements An important part of evaluating a tool chain is to find and assign checks or restrictions for the identified potential errors. There are various ways to rearrange or extend an existing tool chain (see Fig 5), such that it becomes more resilient to tool errors. Often introducing additional checks before or after a use case helps to detect or prevent errors. For example the error Wrong Options Used by the use case Compile-App from the example above can be detected by having a Logfile Inspection check in the use case. With Logfile Inspection we mean redirecting every compiler call to a log file and then asking the user to inspect this log file for correct compiler calls. A very general counter measure is to introduce redundant and independently developed tools for the same purpose. For example many errors from the tool chain above can be detected by having a validation test run, where an alternative coverage tool and compiler is used, at least once before the product is released. In this context special care is required to avoid common cause failures. As an example, common cause failures may occur because of common components, e.g. commercial parser frontends for embedded compilers. Also note that there are circumstances, where it suffices to have structural coverage measured in other tests on the same code. For example if 100% MC/DC is a test aim of two different test levels and different coverage tools are used at both levels one can argue that there is a high chance that missed paths in the product code that are not detected in one test bench due to Wrong Coverage Reported will be detected in the other with high probability provided the acceptance criteria are equally strong. However, an argumentation like this needs to be worked out carefully and requires checking sideconditions: For instance, are the same test design methods used, and are and equivalent test goals, e.g. full functional requirement coverage, applied in both test levels?
9 Fig 5. Extended testing tool chain, all errors have counter measures 5 Industrial Experience We have applied the model based approach to a real industrial tool chain consisting of 37 tools, which is used for automotive SW development of hardware near SW modules. In total we have identified 136 distinct use cases in this tool chain over the whole development lifecycle, e.g. Requirements, Design, Coding, Unit Tests, Integration Tests, System Tests and Maintenance.
10 Fig 6. TCL status of the industrial tool chain during evaluation The tool chain evaluation was carried out iteratively having the following phases Alpha, Beta, RC, Release. In each phase some adjustments have been made, e.g. dropping unfeasible checks or restrictions or considering some of these as they are implemented in the development process. As a consequence the TCL of tools varied from stage to stage as shown in the table above (see Fig 6). The aim of the Alpha model was to get the tool chain structure complete and correct that is to have all tools, artifacts and use cases captured. In the Beta model the tool chain analysis added potential errors and possible counter measures for these. In a detailed review of this Beta model the tool experts, that is the developers that use these tools in the development project, rejected, confirmed or added errors, checks or restrictions in the Beta model. The RC model contained all potential errors and only checks and restrictions that are already implemented in the development process. The RC model thus reflects the tool confidence situation of the initial development process. In this initial process 11 tools have TCL2 or TCL3 and would thus require qualification. In the Release model some extra checks and restrictions, which have been identified and accepted during evaluation have been added to the process. Most of these extra countermeasures were quick wins, that is measures that do not require much extra effort, e.g. Logfile Inspection. By implementing this reworked tool chain the TCL for 10 tools could be brought to TCL1, only one tool remained at TCL2. Hence, the effort spent in analyzing and reworking the tool chain paid off by saving the need for qualifying 10 tools. In addition the model made clear what functions of the remaining TCL2 tool need to be qualified and a suitable qualification kit can be constructed or demanded from the tool vendor. The effort for the model-based tool chain evaluation varied between 0,5 and 5 days (2 days average) per tool. The effort increases with the number of use cases and interactions to other tools. A monolithic tool, e.g. Zip, is typically simple whereas distributed tools are typically complex, e.g. a test tool with lots of interactions to other tools (compiler, coverage tool, repository) and distributed processes (test application running on eval board, test management running on PC). Using a suggested default tool evaluation or classification from the literature
11 [LPP10], with which we were able to derive the TCL for 25 of the 37 tools within one hour, resulted in qualification needs for 12 tools. If we compare this with the result of only one tool to be qualified as achieved in our model and process based evaluation we get a big difference in terms of costs: assuming only 10 1 days of work for qualification per tool (or comparable amounts of money) this would cause 120 days of qualification work, which is the double amount of effort than classifying 25 tools with 2 days each and qualifying only one tool (25*2+10=60). Furthermore 12 tools cannot be classified using this default classification [LPP10] as they do not fall into one of the mentioned categories. 6 Conclusion In this paper we have proposed a meta model for tool chains and a method for using this modeling for tool chain evaluation, that is TCL determination, according to ISO Having a model-based tool chain evaluation brings the following benefits: Automation (TCL computation, Report Generation) Adaptivity (Incremental Changes) Explorability (What effect do changes have?) Rework support (Review checklists, Change tracking) Enhanced quality assurance due to automated plausibility checks The safety norm ISO offers a lot of flexibility to reach confidence in the use of tools. It considers tools together with the process they are used in and thus offers the possibility to adapt a process such that potential tool errors are detected with high probability within this process. This is a great opportunity to reduce the costs for tool qualification. On the other hand the use of qualified tools can reduce the process overhead and optimize the development and test processes by eliminating some checks and restrictions needed for working with unqualified tools (even if they can be partially automated). Note that sometimes qualification kits that can be purchased bring along additional checks and restrictions, e.g. input range restrictions, to ensure the correct use of the tool in the perimeter of the use cases and functions covered by the qualification kit. Finding the optimal balance between development cost and qualification costs depends on the number and size of use cases of the tool and differs in each application scenario or company.the author area is a Word table. To insert or remove authors, insert or remove columns through Word s Table menu. Use this menu also to adjust table and column width. 1 If qualification kits are not available it may be much more work to qualify a tool by building an adequate qualification kit.
12 Acknowledgements This work has been supported by ARTEMIS and the German Federal Ministry of Research and Education (BMBF) within project RECOMP under research grant 1IS10001A. Furthermore we would like to thank Stefan Dirix for his contributions to the Tool Chain Analyzer. References [61508] International Electrotechnical Commission, IEC 61508, Functional safety of electrical/electronic/programmable electronic safety-related systmes, Edition 2.0, Apr [Be10] Beine M. A Model-Based Reference Workflow for the Development of Safety-Critical Software. In: Embedded Real Time Software and Systems, [DO178] Radio Technical Commission for Aeronautics, RTCA DO-178C, Software Considerations in Airborne Systems and Equipment Certification, Dec [DO330] Radio Technical Commission for Aeronautics, RTCA DO-330, Software Tool Qualification Considerations, Dec [Hi11] [L92] [ISO26] [LPP10] [SC04] [SS07] [TCA] Hillebrand J., Reichenpfader P, Mandic I., Siegl H., and Peer C. Establishing Confidence in the Usage of Software Tools in Context of ISO In SAFECOMP'11, Laprie J.C. (ed.): Dependability: Basic Concepts and Terminology. Book. Springer- Verlag, ISBN International Organization for Standardization. ISO Road Vehicles Functional safety. 1st Edition, Löw P., Pabst P., Petry E., Funktionale Sicherheit in der Praxis: Anwendung von DIN EN und ISO/DIS bei der Entwicklung von Serienprodukten, 2010, dpunkt Verlag. Stürmer I. and Conrad M. Code Generator Certification: a Testsuite-Oriented Approach. In Proc of Automotive-Safety & Security, Schneider S., Slotosch O. A Validation Suite for Model-based Development Tools In CONQUEST Validas Tool Chain Analyzer. Obtainable freely from [WPS12] Wildmoser M., Philipps J., Slotosch O. Determining potential errors in tool chains Strategies to reach tool confidence according to ISO26262 Submitted to SAFECOMP 2012.
Applying ISO26262 to Tool Qualification
Applying ISO26262 to Tool Qualification Dr. Oscar Slotosch, Validas AG Marco Reiling, Wind River Seite 1 Content: Tool Chain Analysis Motivation: ISO 26262: Tool Confidence Method: Tool Chain Analysis
ISO 26262 Exemplary Tool Classification of Model-Based Design Tools
ISO 26262 Exemplary Classification of Model-Based Design s Mirko Conrad 1, Ines Fey 2 1 The MathWorks, Inc., Natick, MA, USA [email protected] 2 samoconsult GmbH Berlin, Germany [email protected]
Qualifying Software Tools According to ISO 26262
Qualifying Software Tools According to ISO 26262 Mirko Conrad 1, Patrick Munier 2, Frank Rauch 3 1 The MathWorks, Inc., Natick, MA, USA [email protected] 2 The MathWorks, SAS, Grenoble, France
IBM Rational Rhapsody
IBM Rational Rhapsody IBM Rational Rhapsody Reference Workflow Guide Version 1.9 License Agreement No part of this publication may be reproduced, transmitted, stored in a retrieval system, nor translated
TESSY Automated dynamic module/unit and. CTE Classification Tree Editor. integration testing of embedded applications. for test case specifications
TESSY Automated dynamic module/unit and integration testing of embedded applications CTE Classification Tree Editor for test case specifications Automated module/unit testing and debugging at its best
Certification of a Scade 6 compiler
Certification of a Scade 6 compiler F-X Fornari Esterel Technologies 1 Introduction Topic : What does mean developping a certified software? In particular, using embedded sofware development rules! What
Development of AUTOSAR Software Components within Model-Based Design
2008-01-0383 Development of AUTOSAR Software Components within Model-Based Design Copyright 2008 The MathWorks, Inc. Guido Sandmann Automotive Marketing Manager, EMEA The MathWorks Richard Thompson Senior
Introduction of ISO/DIS 26262 (ISO 26262) Parts of ISO 26262 ASIL Levels Part 6 : Product Development Software Level
ISO 26262 the Emerging Automotive Safety Standard Agenda Introduction of ISO/DIS 26262 (ISO 26262) Parts of ISO 26262 ASIL Levels Part 4 : Product Development System Level Part 6 : Product Development
Design of automatic testing tool for railway signalling systems software safety assessment
Risk Analysis VI 513 Design of automatic testing tool for railway signalling systems software safety assessment J.-G. Hwang 1, H.-J. Jo 1 & H.-S. Kim 2 1 Train Control Research Team, Korea Railroad Research
Parameters for Efficient Software Certification
Parameters for Efficient Software Certification Roland Wolfig, [email protected] Vienna University of Technology, Real-Time Systems Group 1 Abstract Software certification is a common approach
ISO 26262 Introduction
ISO 26262 Introduction Prof. Christian Madritsch 2012 Table of Contents Structure of ISO 26262 Management of Functional Safety Product Development System Level Product Development Hardware Level Product
Safe Automotive software architecture (SAFE) WP 6, WT 6.1.1 Deliverable D.6.1.1 Methods for Assessment Activity Architecture Model (AAM)
Contract number: ITEA2 10039 Safe Automotive software architecture (SAFE) ITEA Roadmap application domains: Major: Services, Systems & Software Creation Minor: Society ITEA Roadmap technology categories:
How to Upgrade SPICE-Compliant Processes for Functional Safety
How to Upgrade SPICE-Compliant Processes for Functional Safety Dr. Erwin Petry KUGLER MAAG CIE GmbH Leibnizstraße 11 70806 Kornwestheim Germany Mobile: +49 173 67 87 337 Tel: +49 7154-1796-222 Fax: +49
Verification and Validation According to ISO 26262: A Workflow to Facilitate the Development of High-Integrity Software
ABSTRACT Verification and Validation According to ISO 26262: A Workflow to Facilitate the Development of High-Integrity Software Mirko Conrad The MathWorks, Inc. Natick, MA, USA [email protected]
Creating Competitive Advantage: The role for ALM in the PLM world
Creating Competitive Advantage: The role for ALM in the PLM world Michael Azoff Principal Analyst, Ovum [email protected] Version 9 Oct, 2014 1 Copyright Ovum. All rights reserved. Ovum is a subsidiary
Verification and Validation of Software Components and Component Based Software Systems
Chapter 5 29 Verification and Validation of Software Components and Component Based Christina Wallin Industrial Information Technology Software Engineering Processes ABB Corporate Research [email protected]
Reduce Medical Device Compliance Costs with Best Practices. [email protected]
Reduce Medical Device Compliance Costs with Best Practices [email protected] 1 Agenda Medical Software Certification How new is Critical Software Certification? What do we need to do? What Best Practises
Model Based System Engineering (MBSE) For Accelerating Software Development Cycle
Model Based System Engineering (MBSE) For Accelerating Software Development Cycle Manish Patil Sujith Annamaneni September 2015 1 Contents 1. Abstract... 3 2. MBSE Overview... 4 3. MBSE Development Cycle...
TÜ V Rheinland Industrie Service
TÜ V Rheinland Industrie Service Business Area: Automation / Functional Safety Contact Minsung Lee +82-2-860-9969 mailto : [email protected] Sales Account Manager for Functional Safety Fax +82-2-860-9862
Safe-E. Safe-E Introduction. Coordination: Andreas ECKEL TTTech Computertechnik AG [email protected]
Introduction Coordination: Andreas ECKEL TTTech Computertechnik AG [email protected] The Eurostars Project within the ITEA-2 Safe Project Eurostars : what is it and why?: Eurostars is an Eureka
The Impact of RTCA DO-178C on Software Development
Cognizant 20-20 Insights The Impact of RTCA DO-178C on Software Development By following DO-178C, organizations can implement aeronautical software with clear and consistent ties to existing systems and
Hitex Germany. White Paper. Unit Test of Embedded Software
Hitex Germany Head Quarters Greschbachstr. 12 76229 Karlsruhe Germany +049-721-9628-0 Fax +049-721-9628-149 E-mail: [email protected] WEB: www.hitex.de Hitex UK Warwick University Science Park Coventry CV47EZ
Using CMM with DO-178B/ED-12B for Airborne System Development
Using CMM with DO-178B/ED-12B for Airborne System Development WHITE PAPER Author : Narasimha Swamy (Project Manager, Avionics Practice) Most aircraft companies develop onboard systems software for civilian
Anwendung von Polyspace im Software Entwicklungsprozess nach IEC 60880. München, 19.05.2011, Dr.-Ing. Jörg Barrho
Anwendung von Polyspace im Software Entwicklungsprozess nach IEC 60880 München, 19.05.2011, Dr.-Ing. Jörg Barrho Agenda 01 Tognum and MTU Friedrichshafen 02 Background and project 03 Overview IEC 60880
Certification Authorities Software Team (CAST) Position Paper CAST-26
Certification Authorities Software Team (CAST) Position Paper CAST-26 VERIFICATION INDEPENDENCE COMPLETED January 2006 (Rev 0) NOTE: This position paper has been coordinated among the software specialists
Do you know? "7 Practices" for a Reliable Requirements Management. by Software Process Engineering Inc. translated by Sparx Systems Japan Co., Ltd.
Do you know? "7 Practices" for a Reliable Requirements Management by Software Process Engineering Inc. translated by Sparx Systems Japan Co., Ltd. In this white paper, we focus on the "Requirements Management,"
Code Coverage: Free Software and Virtualization to the Rescue
Code Coverage: Free Software and Virtualization to the Rescue Franco Gasperoni, AdaCore [email protected] What is Code Coverage and Why Is It Useful? Your team is developing or updating an embedded
Static Analysis of Dynamic Properties - Automatic Program Verification to Prove the Absence of Dynamic Runtime Errors
Static Analysis of Dynamic Properties - Automatic Program Verification to Prove the Absence of Dynamic Runtime Errors Klaus Wissing PolySpace Technologies GmbH Argelsrieder Feld 22 82234 Wessling-Oberpfaffenhofen
Software Production. Industrialized integration and validation of TargetLink models for series production
PAGE 24 EB AUTOMOTIVE Industrialized integration and validation of TargetLink models for series production Continuous Software Production The complexity of software systems in vehicles is increasing at
SAFE SOFTWARE FOR SPACE APPLICATIONS: BUILDING ON THE DO-178 EXPERIENCE. Cheryl A. Dorsey Digital Flight / Solutions cadorsey@df-solutions.
SAFE SOFTWARE FOR SPACE APPLICATIONS: BUILDING ON THE DO-178 EXPERIENCE Cheryl A. Dorsey Digital Flight / Solutions [email protected] DIGITAL FLIGHT / SOLUTIONS Presentation Outline DO-178 Overview
Testing the Internet of Things
Presentation to TMF Testing the Internet of Things Test and Verification Solutions Delivering Tailored Solutions for Hardware Verification and Software Testing What is the IoT? Wikipedia The Internet of
Noorul Islam College of Engineering M. Sc. Software Engineering (5 yrs) IX Semester XCS592- Software Project Management
Noorul Islam College of Engineering M. Sc. Software Engineering (5 yrs) IX Semester XCS592- Software Project Management 8. What is the principle of prototype model? A prototype is built to quickly demonstrate
Process Models and Metrics
Process Models and Metrics PROCESS MODELS AND METRICS These models and metrics capture information about the processes being performed We can model and measure the definition of the process process performers
Effective Software Security Management
Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta [email protected] / [email protected] Table of Contents Abstract... 1
Wiederverwendung von Testfällen bei der modellbasierten SW-Entwicklung
Wiederverwendung von Testfällen bei der modellbasierten SW-Entwicklung DGLR Workshop "Verifikation in der modellbasierten Software-Entwicklung" Garching, 04 October 2011 Dipl.-Ing. Peter Hermle, Key Account
Software testing. Objectives
Software testing cmsc435-1 Objectives To discuss the distinctions between validation testing and defect testing To describe the principles of system and component testing To describe strategies for generating
Quality Assurance Methods for Model-based Development: A Survey and Assessment
2007-01-0506 Quality Assurance Methods for Model-based Development: A Survey and Assessment Copyright 2007 SAE International Ines Fey DaimlerChrysler AG, Berlin, Germany [email protected] Ingo
Safety and security related features in AUTOSAR
Safety and security related features in Dr. Stefan Bunzel Spokesperson (Continental) Co-Authors: S. Fürst, Dr. J. Wagenhuber (BMW), Dr. F. Stappert (Continental) Automotive - Safety & Security 2010 22
Test-Driven Approach for Safety-Critical Software Development
Test-Driven Approach for Safety-Critical Software Development Onur Özçelik 1,2*, D. Turgay Altilar2 1 Scientific 2 and Technological Research Council of Turkey, 41470 Kocaeli, Turkey. Department of Computer
ACHIEVING FUNCTIONAL SAFETY OF AUDI DYNAMIC STEERING USING A STRUCTURED DEVELOPMENT PROCESS
ACHIEVING FUNCTIONAL SAFETY OF AUDI DYNAMIC STEERING USING A STRUCTURED DEVELOPMENT PROCESS Dr Juergen Schuller* 1, Marnix Lannoije* 2, Dr Michael Sagefka* 3, Wolfgang Dick* 4, Dr Ralf Schwarz* 5 * 1 Audi
Certified Tester. Advanced Level Overview
Version 2012 Copyright Notice This document may be copied in its entirety, or extracts made, if the source is acknowledged. Copyright (hereinafter called ISTQB ). Advanced Level Working Group: Mike Smith
Satisfying ASIL Requirements with Parasoft C++test Achieving Functional Safety in the Automotive Industry
Satisfying Requirements with Parasoft C++test Achieving Functional Safety in the Automotive Industry Introduction Safety functions are increasingly being carried out by electrical, electronic, or programmable
Testing of safety-critical software some principles
1(60) Testing of safety-critical software some principles Emerging Trends in Software Testing: autumn 2012 Matti Vuori, Tampere University of Technology 27.11.2012 Contents 1/4 Topics of this lecture 6
Efficient and Faster PLC Software Development Process for Automotive industry. Demetrio Cortese IVECO Embedded Software Design
Efficient and Faster PLC Software Development Process for Automotive industry Demetrio Cortese IVECO Embedded Software Design 13-06-2013 Automotive OEM Mandatory Requirement Delivery the new vehicle in
FSW QA Testing Levels Definitions
FSW QA Testing Levels Definitions 1. Overview This document is used to help determine the amount and quality of testing (or its scope) that is planned for or has been performed on a project. This analysis
How To Improve Software Quality
Software Quality and Standards Dr. James A. Bednar [email protected] http://homepages.inf.ed.ac.uk/jbednar Dr. David Robertson [email protected] http://www.inf.ed.ac.uk/ssp/members/dave.htm SEOC2 Spring
ISO 26262:2011 Functional Safety Assessment Report. Texas Instruments Richardson, TX USA. Project: TDA2X ADAS SoC. Customer:
ISO 26262:2011 Functional Safety Report Project: TDA2X ADAS SoC Customer: Texas Instruments Richardson, TX USA Contract No.: Q13/09-037 Report No.: TI 13-09-037 R002 Version V1, Revision R1, January 23,
Data Quality Assessment. Approach
Approach Prepared By: Sanjay Seth Data Quality Assessment Approach-Review.doc Page 1 of 15 Introduction Data quality is crucial to the success of Business Intelligence initiatives. Unless data in source
Knowledge Base Data Warehouse Methodology
Knowledge Base Data Warehouse Methodology Knowledge Base's data warehousing services can help the client with all phases of understanding, designing, implementing, and maintaining a data warehouse. This
Virtual Platforms Addressing challenges in telecom product development
white paper Virtual Platforms Addressing challenges in telecom product development This page is intentionally left blank. EXECUTIVE SUMMARY Telecom Equipment Manufacturers (TEMs) are currently facing numerous
Effective Software Verification for Medical Devices
STERLINGTECH AND KLOCWORK WHITE PAPER NOVEMBER 2009 Effective Software Verification for Medical Devices Achieving compliance and meeting productivity goals with static analysis In addition to producing
Best Practices for Verification, Validation, and Test in Model- Based Design
2008-01-1469 Best Practices for Verification, Validation, and in Model- Based Design Copyright 2008 The MathWorks, Inc. Brett Murphy, Amory Wakefield, and Jon Friedman The MathWorks, Inc. ABSTRACT Model-Based
Basic Unix/Linux 1. Software Testing Interview Prep
Basic Unix/Linux 1 Programming Fundamentals and Concepts 2 1. What is the difference between web application and client server application? Client server application is designed typically to work in a
Rational Quality Manager. Quick Start Tutorial
Rational Quality Manager Quick Start Tutorial 1 Contents 1. Introduction... 2 2. Terminology... 3 3. Project Area Preparation... 4 3.1 Adding Users and specifying Roles... 4 3.2 Managing Tool Associations...
Efficient Management of Tests and Defects in Variant-Rich Systems with pure::variants and IBM Rational ClearQuest
Efficient Management of Tests and Defects in Variant-Rich Systems with pure::variants and IBM Rational ClearQuest Publisher pure-systems GmbH Agnetenstrasse 14 39106 Magdeburg http://www.pure-systems.com
JOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at http://www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2006 Vol. 5, No. 6, July - August 2006 On Assuring Software Quality and Curbing Software
Procedure for Assessment of System and Software
Doc. No: STQC IT/ Assessment/ 01, Version 1.0 Procedure for Assessment of System and Software May, 2014 STQC - IT Services STQC Directorate, Department of Electronics and Information Technology, Ministry
Quality Management. Lecture 12 Software quality management
Quality Management Lecture 12 Software quality management doc.dr.sc. Marko Jurčević prof.dr.sc. Roman Malarić University of Zagreb Faculty of Electrical Engineering and Computing Department of Fundamentals
Safety-Critical Systems: Processes, Standards and Certification
Fachbereich 17 - Mathematik/Informatik Arbeitsgruppe Softwaretechnik Warburger Straße 100 33098 Paderborn Safety-Critical Systems: Processes, Standards and Certification for the Seminar Analysis, Design
11.1 inspectit. 11.1. inspectit
11.1. inspectit Figure 11.1. Overview on the inspectit components [Siegl and Bouillet 2011] 11.1 inspectit The inspectit monitoring tool (website: http://www.inspectit.eu/) has been developed by NovaTec.
Software Engineering/Courses Description Introduction to Software Engineering Credit Hours: 3 Prerequisite: 0306211(Computer Programming 2).
0305203 0305280 0305301 0305302 Software Engineering/Courses Description Introduction to Software Engineering Prerequisite: 0306211(Computer Programming 2). This course introduces students to the problems
Hardware in the Loop (HIL) Testing VU 2.0, 182.117, WS 2008/09
Testen von Embedded Systems Hardware in the Loop (HIL) Testing VU 2.0, 182.117, WS 2008/09 Raimund dkirner Testing Embedded Software Testing the whole system including the physical environment is not possible
find model parameters, to validate models, and to develop inputs for models. c 1994 Raj Jain 7.1
Monitors Monitor: A tool used to observe the activities on a system. Usage: A system programmer may use a monitor to improve software performance. Find frequently used segments of the software. A systems
Subject Software Aspects of Certification
EASA NOTIFICATION OF A PROPOSAL TO ISSUE A CERTIFICATION MEMORANDUM EASA Proposed CM No.: EASA CM - SWAEH 002 Issue: 02 Issue Date: 22 nd of October 2013 Issued by: Safety, Software & Airborne Electronic
ENEA: THE PROVEN LEADER IN SAFETY CRITICAL AVIONICS SYSTEMS
ENEA: THE PROVEN LEADER IN SAFETY CRITICAL AVIONICS SYSTEMS [email protected]. www.enea.com For over 40 years, we have been one of the fastest growing avionics consulting companies in the world. Today our
Medical Device Software Standards for Safety and Regulatory Compliance
Medical Device Software Standards for Safety and Regulatory Compliance Sherman Eagles +1 612-865-0107 [email protected] www.softwarecpr.com Assuring safe software SAFE All hazards have been addressed
Test Data Management
Test Data Management The Best Practices in TDM Abhik Kar Independent Validation Solutions Infosys Technologies Limited Florida, USA Debdatta Lahiri Independent Validation Solutions Infosys Technologies
IEC 61508 Overview Report
IEC 61508 Overview Report A Summary of the IEC 61508 Standard for Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems exida Sellersville, PA 18960, USA +1-215-453-1720
IMPLEMENTATION OF DATA PROCESSING AND AUTOMATED ALGORITHM BASED FAULT DETECTION FOR SOLAR THERMAL SYSTEMS
IMPLEMENTATION OF DATA PROCESSING AND AUTOMATED ALGORITHM BASED FAULT DETECTION FOR SOLAR THERMAL SYSTEMS Stefan Küthe, Corry de Keizer, Reza Shahbazfar and Klaus Vajen Institute of Thermal Engineering,
Chapter 8 Software Testing
Chapter 8 Software Testing Summary 1 Topics covered Development testing Test-driven development Release testing User testing 2 Program testing Testing is intended to show that a program does what it is
Modularisation and functional safety in mechanical and plant engineering
Modularisation and functional safety in mechanical and plant engineering Wideburg Solutions Ever since our founding in May 2011, our primary objective has been to transfer successful concepts and methods
Requirements-driven Verification Methodology for Standards Compliance
Requirements-driven Verification Methodology for Standards Compliance Serrie-justine Chapman (TVS) [email protected] Mike Bartley (TVS) [email protected] Darren Galpin (Infineon)
Rigorous Methods for Software Engineering (F21RS1) High Integrity Software Development
Rigorous Methods for Software Engineering (F21RS1) High Integrity Software Development Andrew Ireland Department of Computer Science School of Mathematical and Computer Sciences Heriot-Watt University
Group18-CUCE2012. Mr. Mobile Project. Software Testing Plan (STP) Version: 4.0. CM Identifier: G18_SE004
Group18-CUCE2012 Mr. Mobile Project Software Testing Plan (STP) Version: 4.0 CM Identifier: G18_SE004 26 April 2010 Revision History Prepared/ Modified by Ahmed Adel Ahmed Abdullah, Ahmed Hafez and Sheriff
Efficient Verification for Avionic Product Development
YAVE Test Systems Efficient Verification for Avionic Product Development With YAVE FTI offers the full range of test systems from compact budget units up to complex systems configured to customers individual
IEC 61508 Functional Safety Assessment. Project: K-TEK Corporation AT100, AT100S, AT200 Magnetostrictive Level Transmitter.
61508 SIL 3 CAPABLE IEC 61508 Functional Safety Assessment Project: K-TEK Corporation AT100, AT100S, AT200 Magnetostrictive Level Transmitter Customer: K-TEK Corporation Prairieville, LA USA Contract No.:
Moving from ISO9000 to the Higher Levels of the Capability Maturity Model (CMM)
Moving from ISO9000 to the Higher Levels of the Capability Maturity Model (CMM) Pankaj Jalote 1 Infosys Technologies Ltd. Bangalore 561 229 Fax: +91-512-590725/590413 [email protected], [email protected]
Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process
Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process By Andreas Lindenthal and Franz Walkembach, Wind River The concept of autonomous vehicles or unmanned
IQ MORE / IQ MORE Professional
IQ MORE / IQ MORE Professional Version 5 Manual APIS Informationstechnologien GmbH The information contained in this document may be changed without advance notice and represents no obligation on the part
Erik van Veenendaal. www. erikvanveenendaal.nl. Improve Quality Services BV 2
PRISMA Risk-Based Testing In Practice Never speculate on that which can be known for certain Erik van Veenendaal www.erikvanveenendaal.nl Erik van Veenendaal www. erikvanveenendaal.nl Founder and major
Certification Authorities Software Team (CAST) Position Paper CAST-13
Certification Authorities Software Team (CAST) Position Paper CAST-13 Automatic Code Generation Tools Development Assurance Completed June 2002 NOTE: This position paper has been coordinated among the
asuresign Aero (NATEP Grant MA005)
asuresign Aero (NATEP Grant MA005) WP2 Workshop: Identification of Needs for Tool Support in Meeting Aircraft Avionics Systems, Hardware & Software Certification Standards Dr Chris Harper Systems & Safety
Using the Agile Methodology to Mitigate the Risks of Highly Adaptive Projects
Transdyne Corporation CMMI Implementations in Small & Medium Organizations Using the Agile Methodology to Mitigate the Risks of Highly Adaptive Projects Dana Roberson Quality Software Engineer NNSA Service
Difference Between Model-Driven and Traditional Iterative Software Development
Process Implications of Model-Driven Software Development Author: Jorn Bettin Version 1.0 September 2004 Copyright 2003, 2004 SoftMetaWare Ltd. SoftMetaWare is a trademark of SoftMetaWare Ltd. All other
Latest Trends in Testing. Ajay K Chhokra
Latest Trends in Testing Ajay K Chhokra Introduction Software Testing is the last phase in software development lifecycle which has high impact on the quality of the final product delivered to the customer.
When COTS is not SOUP Commercial Off-the-Shelf Software in Medical Systems. Chris Hobbs, Senior Developer, Safe Systems
When COTS is not SOUP Commercial Off-the-Shelf Software in Medical Systems Chris Hobbs, Senior Developer, Safe Systems 2 Audience and Assumptions Who will benefit from this presentation? Software designers
Development Process Automation Experiences in Japan
Development Process Automation Experiences in Japan Dr. Olaf Kath ikv ++ technologies ag Germany ikv++ technologies ag 2007 who we are core business optimization and automation of our customer s system
Automotive Tester. Certification. Version 1.0. March 2011. Automotive Tester Board
Automotive Tester Certification March 2011 Automotive Tester Board Table of Contents 1. Module 1: Principles of Testing (7 hours)... 4 1.1. Introduction to the Automotive Tester course... 4 2.1. Software
The SPES Methodology Modeling- and Analysis Techniques
The SPES Methodology Modeling- and Analysis Techniques Dr. Wolfgang Böhm Technische Universität München [email protected] Agenda SPES_XT Project Overview Some Basic Notions The SPES Methodology SPES_XT
Revision History Revision Date 3.0 14.02.10. Changes Initial version published to http://www.isasecure.org
SDLA-312 ISA Security Compliance Institute Security Development Lifecycle Assurance - Security Development Lifecycle Assessment v3.0 Lifecycle Phases Number Phase Name Description PH1 Security Management
Software Project Audit Process
Software Project Audit Process Version 1.2 Information and Communication Technology Agency of Sri Lanka July 2013 Copyright 2011 ICTA Software Project Audit Process-v-1.2 Revision History Date Version
TPM Key Backup and Recovery. For Trusted Platforms
TPM Key Backup and Recovery For Trusted Platforms White paper for understanding and support proper use of backup and recovery procedures for Trusted Computing Platforms. 2006-09-21 V0.95 Page 1 / 17 Contents
Development of Performance Testing Tool for Railway Signaling System Software
Vol. 10, No. 2, pp. 16-20, December 2011 Development of Performance Testing Tool for Railway Signaling System Software Jong-Gyu Hwang* and Hyun-Jeong Jo Korea Railroad Research Institute, Uiwang-si 437-757,
unless the manufacturer upgrades the firmware, whereas the effort is repeated.
Software Validation in Accredited Laboratories A Practical Guide Gregory D. Gogates Fasor Inc., 3101 Skippack Pike, Lansdale, Pennsylvania 19446-5864 USA [email protected] www.fasor.com Abstract Software
DO-178B compliance: turn an overhead expense into a competitive advantage
IBM Software Rational Aerospace and Defense DO-178B compliance: turn an overhead expense into a competitive advantage 2 DO-178B compliance: turn an overhead expense into a competitive advantage Contents
