DOI QR코드

DOI QR Code

Compositional Safety Analysis for Embedded Systems using the FSM Behavioral Equivalence Algorithm

FSM의 행위 일치 알고리즘을 이용한 임베디드 시스템의 합성적 안전성 분석 기법

  • 이우진 (경북대학교 전자전기컴퓨터학부)
  • Published : 2007.10.31

Abstract

As the embedded systems closely related with our living become complex by interoperating each other via internet, the safety issue of embedded systems begins to appear For checking safety properties of the system interactions, it is necessary to describe the system behaviors in formal methods and provide a systematic safety analysis technique. In this research, the behaviors of an embedded system are described by Labeled Transition Systems(LTS) and its safety properties are checked on the system model. For enhancing the existing compositional safety analysis technique, we perform the safety analysis techniques by checking the behavioral equivalence of the reduced model and a property model after reducing the system model in the viewpoint of the property.

실생활과 밀접한 임베디드 시스템들이 인터넷에 연결되어 점차 복잡해지고 시스템 사용 패턴 또한 다양해짐에 따라 임베디드 시스템의 안전성 문제가 대두되고 있다. 임베디드 시스템의 상호작용에 대한 안전성을 분석하기 위서는 시스템 모델을 정형적으로 기술하고 이를 이용하는 체계적인 안전성 분석 방법이 필요하다. 이 연구에서는 Labeled Transition Systems (LTS)를 이용하여 시스템 모델과 속성 모델을 기술하고 안전성 속성이 만족되는지 검사하는 방법을 제공한다. 이 연구에서는 기존 합성적 안전성 분석 방법의 문제점을 해결하기 위해 시스템 모델을 속성모델 관점에서 축약하여 생성한 후에 두 모델 간의 행위 일치 관계를 이용하여 안전성 분석을 수행한다.

Keywords

References

  1. Edward A. Addy, 'Methodology of independent software nuclear safety analysis,' Proc. of 5th International Symposium on Software Reliability Engineering, pp.76-83, Nov., 1994 https://doi.org/10.1109/ISSRE.1994.341356
  2. K Sayre, J. Kenner, P.L. Jones, 'Safety models : an analytical tool for risk analysis of medical device systems,' Proc. of 14th IEEE Symposium on Computer-Based Medical Systems, pp.445-451, July 2001 https://doi.org/10.1109/CBMS.2001.941760
  3. A.C. Tribble, S.P. Miller, 'Software safety analysis of a flight management system vertical navigation function- a status report,' Proc. of the 22nd Digital Avionics Systems, Oct. 2003 https://doi.org/10.1109/DASC.2003.1245805
  4. A.C. Tribble, S.P. Miller, 'Software intensive systems safety analysis,' IEEE Aerospace and Electronic System Magazine, Vol.19, No.10, pp.21-26, Oct. 2004 https://doi.org/10.1109/MAES.2004.1365014
  5. Nancy G. Leveson, Sofeware : System Safety and Computers, Addison-Wesley Publishing Company, 1995
  6. G. Parthasarathy, M.K. Iyer, K.T. Cheng, and L.C. Wang, 'Safety property verification using sequential SAT and bounded modeling checking,' IEEE Design and Test of Computers, Vol.21, No.2, pp.132-143, Mar-Apr., 2004 https://doi.org/10.1109/MDT.2004.1277906
  7. W. Atkinson, J. Cunningham, 'Proving properties of a safety-critical system,' Software Engineering Journal, Vol.6, No.2, pp.41-50, Mar., 1991 https://doi.org/10.1049/sej.1991.0006
  8. S. C. Cheung, J. Kramer, 'Checking safety properties using compositional reachability analysis,' ACM TOSEM, pp. 49 78, 1999 https://doi.org/10.1145/295558.295570
  9. Robin Milner, Communication and Concurrency, Prentice Hall, 1989
  10. S. Uchitel, et al, 'Synthesis of behavioral models from scenarios,' IEEE trans. on software engineering, Vol.29, No.2, pp.99-115, 2003 https://doi.org/10.1109/TSE.2003.1178048
  11. P. J. Denning, et al., Machines, Languages, and Computation, Prentice Hall, 1978
  12. D. A. Huffman, 'The synthesis of sequential switching circuits,' Journal of Franklin Institute, 1954
  13. D. Harel, 'Statcharts A visual formalism for complex systems,' Sci. Comput. Prog., Vol.8, pp.231-274, 1987 https://doi.org/10.1016/0167-6423(87)90035-9