165,491 research outputs found
A framework for the requirements analysis of safety-critical computing systems
PhD ThesisDigital computers are increasingly being used in safety-critical applications (e.g.,
avionics, chemical plant and railway systems). The main motivations for introducing
computers into such environments are to increase performance, flexibility and efficiency.
However, the cost to safety in achieving these benefits using computing systems is unclear.
The general class of systems considered in this thesis are process control systems. More
specifically the thesis examines the class of safety-critical computing systems which are a
component of a process control system that could cause or allow the overall system to enter
into a hazardous state.
This thesis investigates the role oiformal methods in safety-critical computing systems.
The phase of system development considered is requirements analysis. Experience in
safety-critical systems has shown that errors in the identified requirements are one of the
major causes of mishap. It is argued that to gain a complete understanding of such
computing systems, the requirements of the overall system and the properties of the
environment must be analyzed in a common formal framework. A system development
model based on the separation of safety and mission issues is discussed, which highlights the
essential specifications that must be produced during requirements analysis. A formal
model for the representation of these essential specifications is presented. The semantics
of this formal model are based on the notion of a system history. To structure the
specifications expressed by this formal model the concept of a mode is introduced.
This thesis suggests that for a formal model to be useful during requirements analysis a
related systematic methodology, which provides comprehensive guidelines for the analysts
who use the model must be made available. An appropriate methodology, based upon the
system development model, which incorporates some traditional system safety techniques
is described. Overall, the thesis presents a framework for requirements analysis by
providing a system development model, formal model and related development
methodology. An example of how this framework can support requirements analysis is
presented in the appendices Band C.UK Science and Engineering Research Council:
Alvey Software Reliability Project Grant
Execution time distributions in embedded safety-critical systems using extreme value theory
Several techniques have been proposed to upper-bound the worst-case execution time behaviour of programs in the domain of critical real-time embedded systems. These computing systems have strong requirements regarding the guarantees that the longest execution time a program can take is bounded. Some of those techniques use extreme value theory (EVT) as their main prediction method. In this paper, EVT is used to estimate a high quantile for different types of execution time distributions observed for a set of representative programs for the analysis of automotive applications. A major challenge appears when the dataset seems to be heavy tailed, because this contradicts the previous assumption of embedded safety-critical systems. A methodology based on the coefficient of variation is introduced for a threshold selection algorithm to determine the point above which the distribution can be considered generalised Pareto distribution. This methodology also provides an estimation of the extreme value index and high quantile estimates. We have applied these methods to execution time observations collected from the execution of 16 representative automotive benchmarks to predict an upper-bound to the maximum execution time of this program. Several comparisons with alternative approaches are discussed.The research leading to these results has received funding from the European
Community’s Seventh Framework Programme [FP7/2007-2013] under the PROXIMA
Project (grant agreement 611085). This study was also partially supported by the Spanish
Ministry of Science and Innovation under grants MTM2012-31118 (2013-2015) and
TIN2015-65316-P. Jaume Abella is partially supported by the Ministry of Economy and
Competitiveness under Ramon y Cajal postdoctoral fellowship number RYC-2013-
14717.Peer ReviewedPostprint (author's final draft
Developing a distributed electronic health-record store for India
The DIGHT project is addressing the problem of building a scalable and highly available information store for the Electronic Health Records (EHRs) of the over one billion citizens of India
Semantic Support for Log Analysis of Safety-Critical Embedded Systems
Testing is a relevant activity for the development life-cycle of Safety
Critical Embedded systems. In particular, much effort is spent for analysis and
classification of test logs from SCADA subsystems, especially when failures
occur. The human expertise is needful to understand the reasons of failures,
for tracing back the errors, as well as to understand which requirements are
affected by errors and which ones will be affected by eventual changes in the
system design. Semantic techniques and full text search are used to support
human experts for the analysis and classification of test logs, in order to
speedup and improve the diagnosis phase. Moreover, retrieval of tests and
requirements, which can be related to the current failure, is supported in
order to allow the discovery of available alternatives and solutions for a
better and faster investigation of the problem.Comment: EDCC-2014, BIG4CIP-2014, Embedded systems, testing, semantic
discovery, ontology, big dat
Recommended from our members
Evaluating the resilience and security of boundaryless, evolving socio-technical Systems of Systems
Medical Cyber-Physical Systems Development: A Forensics-Driven Approach
The synthesis of technology and the medical industry has partly contributed
to the increasing interest in Medical Cyber-Physical Systems (MCPS). While
these systems provide benefits to patients and professionals, they also
introduce new attack vectors for malicious actors (e.g. financially-and/or
criminally-motivated actors). A successful breach involving a MCPS can impact
patient data and system availability. The complexity and operating requirements
of a MCPS complicates digital investigations. Coupling this information with
the potentially vast amounts of information that a MCPS produces and/or has
access to is generating discussions on, not only, how to compromise these
systems but, more importantly, how to investigate these systems. The paper
proposes the integration of forensics principles and concepts into the design
and development of a MCPS to strengthen an organization's investigative
posture. The framework sets the foundation for future research in the
refinement of specific solutions for MCPS investigations.Comment: This is the pre-print version of a paper presented at the 2nd
International Workshop on Security, Privacy, and Trustworthiness in Medical
Cyber-Physical Systems (MedSPT 2017
Controlling Concurrent Change - A Multiview Approach Toward Updatable Vehicle Automation Systems
The development of SAE Level 3+ vehicles [{SAE}, 2014] poses new challenges not only for the functional development, but also for design and development processes. Such systems consist of a growing number of interconnected functional, as well as hardware and software components, making safety design increasingly difficult. In order to cope with emergent behavior at the vehicle level, thorough systems engineering becomes a key requirement, which enables traceability between different design viewpoints. Ensuring traceability is a key factor towards an efficient validation and verification of such systems. Formal models can in turn assist in keeping track of how the different viewpoints relate to each other and how the interplay of components affects the overall system behavior. Based on experience from the project Controlling Concurrent Change, this paper presents an approach towards model-based integration and verification of a cause effect chain for a component-based vehicle automation system. It reasons on a cross-layer model of the resulting system, which covers necessary aspects of a design in individual architectural views, e.g. safety and timing. In the synthesis stage of integration, our approach is capable of inserting enforcement mechanisms into the design to ensure adherence to the model. We present a use case description for an environment perception system, starting with a functional architecture, which is the basis for componentization of the cause effect chain. By tying the vehicle architecture to the cross-layer integration model, we are able to map the reasoning done during verification to vehicle behavior
- …