Suppor&ng the Design of Safety Cri&cal Systems Using AADL
|
|
|
- Joy Patterson
- 10 years ago
- Views:
Transcription
1 Suppor&ng the Design of Safety Cri&cal Systems Using AADL T. Correa, L. B. Becker, J.- M. Farines, J.- P. Bodeveix, M. Filali, F. Vernadat IRIT LAAS UFSC
2 Agenda Introduc&on Proposed Approach Verifica&on Process Conclusions
3 Introduc&on Most computer systems are embedded (95%), and many of these are cri*cal AADL is a textual and graphical language used to design and analyze the so3ware and hardware architecture of systems func&onal interfaces to components (such as data inputs and outputs) performance- cri&cal aspects of components (such as &ming)
4 Goal Present a design- process for cri&cal embedded systems to supports the safe design of the system's architecture using MDE's principles Propose an approach that supports model checking over AADL models How to deal with &ming proper&es? (ongoing study with the hardware team TRACES: wcet analysis)
5 Our Proposal Use of AADL as a unique formalism for: Hw and Sw people, synchronous and asynchronous aspects In the AADL model, perform a sequence of model enrichments, which finishes when the model is suitable for verifica&on Experimenta&on on a case study: parking problem
6 Proposed Approach It starts with the defini*on of the func*onal and non- func*onal requirements of the system Constraint: Pla[orm may be a priori given it is concluded with the final model verifica*on, which uses as input the AADL model updated with the precise &ming informa&on.
7 1. Requirements Defini&on 2. Func&onal Modeling + Simula&on Proposed AADL process 3. Environment Descrip&on 4A. Sw Architecture Modeling 4B. Hw Architecture Modeling 5. Sw/Hw Mapping 5B. Architecture Simula&on 6. Refine Real- Time Proper&es 7. Timing Verifica&on
8 Successive Refinements the resul&ng system architecture goes through several verifica&on steps in order to assure its correctness It is performed a sequence of model transforma&ons, which starts with an AADL model and finishes with an automaton model that can be verified Ini&ally the design is synchronous it ends asynchronous (physical architecture)
9 3A. So3ware Architecture Modeling A1. Select System or Thread new refinement? no A2.1. Abstract behavior spec yes A2.2. Architecture Refinement A3. Verifica&on yes more verifica&on? no 4. Sw/Hw Mapping
10 Verifica&on Process AADL model LTL property AADL2FIACRE selt diagnostic Fiacre model frac TTS model tina Automaton model FIACRE is the pivot language of the TOPCASED project FIACRE is a process algebra: message and shared memory. TINA: verifica&on engine (Petri net based) AADL execu&on model «helps» in figh&ng combinatorial explosion Need of property paherns Need of beher support for communica&on abstrac&on
11 Proper&es Use of temporal logic: LTL enriched with events: SE- LTL. In fact, LTL and CTL are not enough: use of Modal Mu calculus: reason over atemporal proper&es (not temporised) Need of an intui&ve logic to reason over the system and its environment. Requests are state and or event based. Need of paherns to avoid new (usually complex) formulas and reuse exis&ng ones.
12 Conclusions Design methodology for soiware- hardware systems. It is not a top down or bohom up approach. Use of AADL as a unique language to address soiware and hardware issues. AADL execu&on model helps for figh&ng against combinatorial explosion. Use of logics to express the proper&es. Need for a logic to express the interac&on between the system and its environment. Need of paherns.
13 3A. So3ware Architecture Modeling A1. Select System or Thread A2.2. Architecture Refinement Proper&es A3. Verifica&on no success? no yes more verifica&on
14 A2.2. Architecture Refinement 1. Iden&fy modes yes new refinement? 2. Iden&fy threads A1. Select System or Thread 3. Map func&ons to threads 4. Add connec&ons 5. Assign modes to threads
15 3A. So3ware Architecture Modeling A1. Select System or Thread new refinement? no 4. Sw/Hw Mapping yes A2.2. Architecture Refinement
16 1. Requirements Defini&on Hw Architecture 2. Environment Descrip&on Sw Architecture Modelling 3. Opera&on Modes Defini&on 4. Behavior spec (Abstract or Detailed) 5. Verifica&on B1. Architecture Modelling B2. Architecture Mapping B3. Architecture Simula&on 6. Real- Time Proper&es Defini&on 7. Timing Verifica&on Inject behavior
Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko
Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning MIS5206 Week 8 In the News Readings In Class Case Study BCP/DRP Test Taking Tip Quiz In the News Discuss items
HOLACONF - Cloud Forward 2015 Conference From Distributed to Complete Computing HAMZA. in collaboration SAHLI with
HOLACONF - Cloud Forward Conference From Distributed to Complete Computing HAMZA in collaboration SAHLI with Pr. Faiza BELALA and Dr. Chafia BOUANAKA LIRE Laboratory, Constantine II University-Abdelhamid
Introduc)on to the IoT- A methodology
10/11/14 1 Introduc)on to the IoTA methodology Olivier SAVRY CEA LETI 10/11/14 2 IoTA Objec)ves Provide a reference model of architecture (ARM) based on Interoperability Scalability Security and Privacy
So#ware Defined Radio (SDR) Architecture and Systems Issues
So#ware Defined Radio (SDR) Architecture and Systems Issues Workshop on Spacecra# Flight So#ware (FSW 09) 2009 11 6 Kenneth J. Peters Jet Propulsion Laboratory, California Ins9tute of Technology Speaker
Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies
Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step Arbela Technologies Why Upgrade? What to do? How to do it? Tools and templates Agenda Sure Step 2012 Ax2012 Upgrade specific steps Checklist
IT Change Management Process Training
IT Change Management Process Training Before you begin: This course was prepared for all IT professionals with the goal of promo9ng awareness of the process. Those taking this course will have varied knowledge
Replacing a commercial integration platform with an open source ESB. Magnus Larsson [email protected] Cadec 2010-01- 20
Replacing a commercial integration platform with an open source ESB Magnus Larsson [email protected] Cadec 2010-01- 20 Agenda The customer Phases Problem defini?on Proof of concepts
CS 5150 So(ware Engineering System Architecture: Introduc<on
Cornell University Compu1ng and Informa1on Science CS 5150 So(ware Engineering System Architecture: Introduc
So#ware quality assurance - introduc4on. Dr Ana Magazinius
So#ware quality assurance - introduc4on Dr Ana Magazinius 1 What is quality? 2 What is a good quality car? 2 and 2 2 minutes 3 characteris4cs 3 What is quality? 4 What is quality? How good or bad something
OS/Run'me and Execu'on Time Produc'vity
OS/Run'me and Execu'on Time Produc'vity Ron Brightwell, Technical Manager Scalable System SoAware Department Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation,
Strategies for Medical Device So2ware Development Presented By Anthony Giles of Blackwood Embedded Solu;ons And a Case Study by Francis Amoah of Creo
Strategies for Medical Device So2ware Development Presented By Anthony Giles of Blackwood Embedded Solu;ons And a Case Study by Francis Amoah of Creo Medical Introduc;on Standards 60601-1 in par;cular
VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov
VoIP Security How to prevent eavesdropping on VoIP conversa8ons Dmitry Dessiatnikov DISCLAIMER All informa8on in this presenta8on is provided for informa8on purposes only and in no event shall Security
CONTENTS. Introduc on 2. Undergraduate Program 4. BSC in Informa on Systems 4. Graduate Program 7. MSC in Informa on Science 7
1 1 2 CONTENTS Introducon 2 Undergraduate Program 4 BSC in Informaon Systems 4 Graduate Program 7 MSC in Informaon Science 7 MSC in Health Informacs 13 2 3 Introducon The School of Informaon Science at
SCADE Suite in Space Applications
SCADE Suite in Space Applications at EADS David Lesens 09/10/2008 Overview Introduction Historical use of SCADE at EADS Astrium ST Why using SCADE? The Automatic Transfer Vehicle (ATV) M51 and Vega R&T
Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves
Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves Alice Squires, [email protected] Tim Ferris, David Olwell, Nicole Hutchison, Rick Adcock, John BrackeL, Mary VanLeer, Tom
Methods and Tools For Embedded Distributed System Scheduling and Schedulability Analysis
Methods and Tools For Embedded Distributed System Scheduling and Schedulability Analysis Steve Vestal Honeywell Labs [email protected] 18 October 2005 Outline Background Binding and Routing Scheduling
Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework
Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Steven Hunt Enterprise IT Governance Strategist NASA Ames Research Center Michael
Business Analysis Center of Excellence The Cornerstone of Business Transformation
February 20, 2013 Business Analysis Center of Excellence The Cornerstone of Business Transformation John E. Parker, CEO Enfocus Solutions Inc. www.enfocussolutions.com 0 John E. Parker (Introduc3on) President
Debugging & Profiling with Open Source SW Tools
Debugging & Profiling with Open Source SW Tools Ivan Giro*o igiro*[email protected] Informa(on & Communica(on Technology Sec(on (ICTS) Interna(onal Centre for Theore(cal Physics (ICTP) What is Debugging?! Iden(fying
Legacy Archiving How many lights do you leave on? September 14 th, 2015
Legacy Archiving How many lights do you leave on? September 14 th, 2015 1 Introductions Wendy Laposata, Himforma(cs Tom Chase, Cone Health 2 About Cone Health More than 100 loca=ons 6 hospitals, 3 ambulatory
Help Framework. Ticket Management Ticket Resolu/on Communica/ons. Ticket Assignment Follow up Customer - communica/on System updates Delay management
Help for JD Edwards Our Help Framework Ticket qualifica/on Ticket crea/on Ticket Rou/ng Closures L1 issues Resolu/on KG SOPs Co- ordinate Ticket Assignment Follow up Customer - communica/on System updates
A Classification of Model Checking-based Verification Approaches for Software Models
A Classification of Model Checking-based Verification Approaches for Software Models Petra Brosch, Sebastian Gabmeyer, Martina Seidl Sebastian Gabmeyer Business Informatics Group Institute of Software
ORION Retail Systems. Orion Digital Integration Inc. Point of Sale Reinvented for a Mobile World
ORION Retail Systems Orion Digital Integration Inc Point of Sale Reinvented for a Mobile World O Orion Retail Systems ORION Digital Integraon Inc. - Corporate Profile Established in 2003, Orion Digital
Bank of America Security by Design. Derrick Barksdale Jason Gillam
Bank of America Security by Design Derrick Barksdale Jason Gillam Costs of Correcting Defects 2 Bank of America The Three P s Product Design and build security into our product People Cultivate a security
Formal verification of contracts for synchronous software components using NuSMV
Formal verification of contracts for synchronous software components using NuSMV Tobias Polzer Lehrstuhl für Informatik 8 Bachelorarbeit 13.05.2014 1 / 19 Problem description and goals Problem description
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP [email protected] HP ENTERPRISE SECURITY SERVICES
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP [email protected] HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define
Advanced Project Management Training Course
Advanced Project Management Training Course 1-34 Advanced Project Management Crea/ng the Scope Baseline 2-34 Crea/ng the Scope Baseline Module 1 Introduction Module 2 Creating the Project Charter Module
Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional.
Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional. 163 Stormont Street New Concord, OH 43762 614-286-7895
Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars
Kaseya Fundamentals Workshop DAY THREE Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 Day Two Overview Day Two Lab Review Patch Management Configura;on
Efficient and Faster PLC Software Development Process for Automotive industry. Demetrio Cortese IVECO Embedded Software Design
Efficient and Faster PLC Software Development Process for Automotive industry Demetrio Cortese IVECO Embedded Software Design 13-06-2013 Automotive OEM Mandatory Requirement Delivery the new vehicle in
Investor Presenta,on Third Quarter 2014. 2014 ServiceNow All Rights Reserved 1
Investor Presenta,on Third Quarter 2014 2014 ServiceNow All Rights Reserved 1 FORWARD- LOOKING STATEMENTS, INDUSTRY AND MARKET DATA This presenta>on contains forward- looking statements that are based
What is a Connected TV. User Experience in Connected TV A usability and eye tracking research 5/3/12
User Experience in Connected TV A usability and eye tracking research Mari- Carmen Marcos. Communica>on Department. Universitat Pompeu Fabra. Verónica Mansilla. Student at Master in Digital Contents Management
CS 4604: Introduc0on to Database Management Systems
CS 4604: Introduc0on to Database Management Systems B. Aditya Prakash Lecture #1: Introduc/on Many slides based on material by Profs. Murali, Ramakrishnan and Faloutsos Course Informa0on Instructor B.
Data Management in the Cloud: Limitations and Opportunities. Annies Ductan
Data Management in the Cloud: Limitations and Opportunities Annies Ductan Discussion Outline: Introduc)on Overview Vision of Cloud Compu8ng Managing Data in The Cloud Cloud Characteris8cs Data Management
AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT
AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT Dalton Cervo Author, Consultant, Management Expert September 2015 This presenta?on contains extracts from books that are: Copyright 2011 John Wiley & Sons,
Building an Effec.ve Cloud Security Program
Building an Effec.ve Cloud Security Program Laura Posey Senior Security Strategist, Microso3 Corpora6on Co- Chair, CSA CAIQ Programming Chair, NY Metro CSA Chapter Is Cloud worth it? Yes! Pla?orm for Innova.on
Capitalize on your carbon management solu4on investment
Capitalize on your carbon management solu4on investment Best prac4ce guide for implemen4ng carbon management so9ware Carbon Disclosure Project +44 (0) 20 7970 5660 [email protected] www.cdproject.net
The increasingly dynamic environment, in
Main Aspects of Enterprise Architecture Concept Chief Assist. Prof. Petya Dankova, Ph.D. Икономически университет Варна, катедра Икономика и управление на индустрията e-mail: [email protected] Abstract:
T-79.186 Reactive Systems: Introduction and Finite State Automata
T-79.186 Reactive Systems: Introduction and Finite State Automata Timo Latvala 14.1.2004 Reactive Systems: Introduction and Finite State Automata 1-1 Reactive Systems Reactive systems are a class of software
Mission. To provide higher technological educa5on with quality, preparing. competent professionals, with sound founda5ons in science, technology
Mission To provide higher technological educa5on with quality, preparing competent professionals, with sound founda5ons in science, technology and innova5on, commi
2015-16 ITS Strategic Plan Enabling an Unbounded University
2015-16 ITS Strategic Plan Enabling an Unbounded University Update: July 31, 2015 IniAaAve: Agility Through Technology Vision Mission Enable Unbounded Learning Support student success through the innovaave
FINANCIAL SERVICES CASE STUDY COLLECTION. Broker Profile, Multrees Investor Services Ltd & Spayne Lindsay & Co. LLP
FINANCIAL SERVICES CASE STUDY COLLECTION Broker Profile, Multrees Investor Services Ltd & Spayne Lindsay & Co. LLP The Workbooks product offered greater functionality... We also felt that we would receive
Enterprise Mobile Application Lifecycle
White Paper Enterprise Mobile Application Lifecycle Developing a Process for End to End Mobile Application Development Prepared by Daniel Maycock, Slalom Consultant Introduction With the increasingly vast
DTCC Data Quality Survey Industry Report
DTCC Data Quality Survey Industry Report November 2013 element 22 unlocking the power of your data Contents 1. Introduction 3 2. Approach and participants 4 3. Summary findings 5 4. Findings by topic 6
Data Management within Land Use Division
Data Management within Land Use Division Goals and func8on of the Land Use Division. Brief overview of GLIS. Database management problems. Conclusions. Primary goals of the division To provide informa8on
Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework
Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework Don t screw with my chain, dude! Jon Boyens Computer Security Division IT Laboratory November
Software Health Management An Introduction. Gabor Karsai Vanderbilt University/ISIS
Software Health Management An Introduction Gabor Karsai Vanderbilt University/ISIS Tutorial at PHM 2009 Outline Definitions Backgrounds Approaches Summary Definitions Software Health Management: A branch
UML TUTORIALS THE USE CASE MODEL
UML TUTORIALS THE USE CASE MODEL www.sparxsystems.com.au Sparx Systems 2004 Page 1/5 describes the proposed functionality of the new system. A Use Case represents a discrete unit of interaction between
Experiments on cost/power and failure aware scheduling for clouds and grids
Experiments on cost/power and failure aware scheduling for clouds and grids Jorge G. Barbosa, Al0no M. Sampaio, Hamid Harabnejad Universidade do Porto, Faculdade de Engenharia, LIACC Porto, Portugal, [email protected]
Connec(ng to the NC Educa(on Cloud
NC Educa)on Cloud Connec(ng to the NC Educa(on Cloud May 2012 Update! http://cloud.fi.ncsu.edu! Dave Furiness, MCNC! Phil Emer, Friday Institute! 1 First Things First Year one was about planning we are
Specification and Analysis of Contracts Lecture 1 Introduction
Specification and Analysis of Contracts Lecture 1 Introduction Gerardo Schneider [email protected] http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo SEFM School, Oct. 27 - Nov.
Identity and Access Positioning of Paradgimo
1 1 Identity and Access Positioning of Paradgimo Olivier Naveau Managing Director assisted by Bruno Guillaume, CISSP IAM in 4D 1. Data Model 2. Functions & Processes 3. Key Components 4. Business Values
Architecture of So-ware Systems HTTP Protocol. Mar8n Rehák
Architecture of So-ware Systems HTTP Protocol Mar8n Rehák HTTP Protocol Hypertext Transfer Protocol Designed to transfer hypertext informa8on over the computer networks Hypertext: Structured text with
Formal Verification by Model Checking
Formal Verification by Model Checking Natasha Sharygina Carnegie Mellon University Guest Lectures at the Analysis of Software Artifacts Class, Spring 2005 1 Outline Lecture 1: Overview of Model Checking
Nodes, Ties and Influence
Nodes, Ties and Influence Chapter 2 Chapter 2, Community Detec:on and Mining in Social Media. Lei Tang and Huan Liu, Morgan & Claypool, September, 2010. 1 IMPORTANCE OF NODES 2 Importance of Nodes Not
Static Program Transformations for Efficient Software Model Checking
Static Program Transformations for Efficient Software Model Checking Shobha Vasudevan Jacob Abraham The University of Texas at Austin Dependable Systems Large and complex systems Software faults are major
Data Governance Framework: Bank of Canada
Data Governance Framework: Bank of Canada The views and opinions expressed herein are those of the author and do not necessarily reflect the official policy or posi8on of the Bank of Canada or any agency
Trends in Embedded Software Engineering
Trends in Embedded Software Engineering Prof. Dr. Wolfgang Pree Department of Computer Science Universität Salzburg cs.uni-salzburg.at MoDECS.cc PREEtec.com Contents Why focus on embedded software? Better
