Suppor&ng the Design of Safety Cri&cal Systems Using AADL



Similar documents
Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko

HOLACONF - Cloud Forward 2015 Conference From Distributed to Complete Computing HAMZA. in collaboration SAHLI with

Introduc)on to the IoT- A methodology

So#ware Defined Radio (SDR) Architecture and Systems Issues

Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies

IT Change Management Process Training

Replacing a commercial integration platform with an open source ESB. Magnus Larsson magnus.larsson@callistaenterprise.se Cadec

CS 5150 So(ware Engineering System Architecture: Introduc<on

So#ware quality assurance - introduc4on. Dr Ana Magazinius

OS/Run'me and Execu'on Time Produc'vity

Strategies for Medical Device So2ware Development Presented By Anthony Giles of Blackwood Embedded Solu;ons And a Case Study by Francis Amoah of Creo

VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov

CONTENTS. Introduc on 2. Undergraduate Program 4. BSC in Informa on Systems 4. Graduate Program 7. MSC in Informa on Science 7

SCADE Suite in Space Applications

Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves

Methods and Tools For Embedded Distributed System Scheduling and Schedulability Analysis

Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework

Business Analysis Center of Excellence The Cornerstone of Business Transformation

Debugging & Profiling with Open Source SW Tools

Legacy Archiving How many lights do you leave on? September 14 th, 2015

Help Framework. Ticket Management Ticket Resolu/on Communica/ons. Ticket Assignment Follow up Customer - communica/on System updates Delay management

A Classification of Model Checking-based Verification Approaches for Software Models

ORION Retail Systems. Orion Digital Integration Inc. Point of Sale Reinvented for a Mobile World

Bank of America Security by Design. Derrick Barksdale Jason Gillam

Formal verification of contracts for synchronous software components using NuSMV

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP HP ENTERPRISE SECURITY SERVICES

Advanced Project Management Training Course

Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional.

Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars

Efficient and Faster PLC Software Development Process for Automotive industry. Demetrio Cortese IVECO Embedded Software Design

Investor Presenta,on Third Quarter ServiceNow All Rights Reserved 1

What is a Connected TV. User Experience in Connected TV A usability and eye tracking research 5/3/12

CS 4604: Introduc0on to Database Management Systems

Data Management in the Cloud: Limitations and Opportunities. Annies Ductan

AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT

Building an Effec.ve Cloud Security Program

Capitalize on your carbon management solu4on investment

The increasingly dynamic environment, in

T Reactive Systems: Introduction and Finite State Automata

Mission. To provide higher technological educa5on with quality, preparing. competent professionals, with sound founda5ons in science, technology

ITS Strategic Plan Enabling an Unbounded University

FINANCIAL SERVICES CASE STUDY COLLECTION. Broker Profile, Multrees Investor Services Ltd & Spayne Lindsay & Co. LLP

Enterprise Mobile Application Lifecycle

DTCC Data Quality Survey Industry Report

Data Management within Land Use Division

Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework

Software Health Management An Introduction. Gabor Karsai Vanderbilt University/ISIS

UML TUTORIALS THE USE CASE MODEL

Experiments on cost/power and failure aware scheduling for clouds and grids

Connec(ng to the NC Educa(on Cloud

Specification and Analysis of Contracts Lecture 1 Introduction

Identity and Access Positioning of Paradgimo

Architecture of So-ware Systems HTTP Protocol. Mar8n Rehák

Formal Verification by Model Checking

Nodes, Ties and Influence

Static Program Transformations for Efficient Software Model Checking

Data Governance Framework: Bank of Canada

Trends in Embedded Software Engineering

Transcription:

Suppor&ng the Design of Safety Cri&cal Systems Using AADL T. Correa, L. B. Becker, J.- M. Farines, J.- P. Bodeveix, M. Filali, F. Vernadat IRIT LAAS UFSC

Agenda Introduc&on Proposed Approach Verifica&on Process Conclusions

Introduc&on Most computer systems are embedded (95%), and many of these are cri*cal AADL is a textual and graphical language used to design and analyze the so3ware and hardware architecture of systems func&onal interfaces to components (such as data inputs and outputs) performance- cri&cal aspects of components (such as &ming)

Goal Present a design- process for cri&cal embedded systems to supports the safe design of the system's architecture using MDE's principles Propose an approach that supports model checking over AADL models How to deal with &ming proper&es? (ongoing study with the hardware team TRACES: wcet analysis)

Our Proposal Use of AADL as a unique formalism for: Hw and Sw people, synchronous and asynchronous aspects In the AADL model, perform a sequence of model enrichments, which finishes when the model is suitable for verifica&on Experimenta&on on a case study: parking problem

Proposed Approach It starts with the defini*on of the func*onal and non- func*onal requirements of the system Constraint: Pla[orm may be a priori given it is concluded with the final model verifica*on, which uses as input the AADL model updated with the precise &ming informa&on.

1. Requirements Defini&on 2. Func&onal Modeling + Simula&on Proposed AADL process 3. Environment Descrip&on 4A. Sw Architecture Modeling 4B. Hw Architecture Modeling 5. Sw/Hw Mapping 5B. Architecture Simula&on 6. Refine Real- Time Proper&es 7. Timing Verifica&on

Successive Refinements the resul&ng system architecture goes through several verifica&on steps in order to assure its correctness It is performed a sequence of model transforma&ons, which starts with an AADL model and finishes with an automaton model that can be verified Ini&ally the design is synchronous it ends asynchronous (physical architecture)

3A. So3ware Architecture Modeling A1. Select System or Thread new refinement? no A2.1. Abstract behavior spec yes A2.2. Architecture Refinement A3. Verifica&on yes more verifica&on? no 4. Sw/Hw Mapping

Verifica&on Process AADL model LTL property AADL2FIACRE selt diagnostic Fiacre model frac TTS model tina Automaton model FIACRE is the pivot language of the TOPCASED project FIACRE is a process algebra: message and shared memory. TINA: verifica&on engine (Petri net based) AADL execu&on model «helps» in figh&ng combinatorial explosion Need of property paherns Need of beher support for communica&on abstrac&on

Proper&es Use of temporal logic: LTL enriched with events: SE- LTL. In fact, LTL and CTL are not enough: use of Modal Mu calculus: reason over atemporal proper&es (not temporised) Need of an intui&ve logic to reason over the system and its environment. Requests are state and or event based. Need of paherns to avoid new (usually complex) formulas and reuse exis&ng ones.

Conclusions Design methodology for soiware- hardware systems. It is not a top down or bohom up approach. Use of AADL as a unique language to address soiware and hardware issues. AADL execu&on model helps for figh&ng against combinatorial explosion. Use of logics to express the proper&es. Need for a logic to express the interac&on between the system and its environment. Need of paherns.

3A. So3ware Architecture Modeling A1. Select System or Thread A2.2. Architecture Refinement Proper&es A3. Verifica&on no success? no yes more verifica&on

A2.2. Architecture Refinement 1. Iden&fy modes yes new refinement? 2. Iden&fy threads A1. Select System or Thread 3. Map func&ons to threads 4. Add connec&ons 5. Assign modes to threads

3A. So3ware Architecture Modeling A1. Select System or Thread new refinement? no 4. Sw/Hw Mapping yes A2.2. Architecture Refinement

1. Requirements Defini&on Hw Architecture 2. Environment Descrip&on Sw Architecture Modelling 3. Opera&on Modes Defini&on 4. Behavior spec (Abstract or Detailed) 5. Verifica&on B1. Architecture Modelling B2. Architecture Mapping B3. Architecture Simula&on 6. Real- Time Proper&es Defini&on 7. Timing Verifica&on Inject behavior