DOI QR코드

DOI QR Code

상태 전이 모델 기반 결함 트리 분석

Fault Tree Analysis based on State-Transition Model

  • 투고 : 2011.07.27
  • 심사 : 2011.09.20
  • 발행 : 2011.10.28

초록

결함 트리 분석(Fault Tree Analysis)은 결함 트리를 구축하여 시스템의 안전성 분석을 수행한다. 그러나 결함 트리를 구성하는 작업은 대상 시스템의 도메인에 대한 지식과 경험을 필요로 하며 많은 시간과 노력을 소요한다. 이 논문에서는 시스템 설계 산출물인 상태 전이 모델을 기반으로 결함 트리를 체계적으로 구성하는 방법을 제안한다. 이를 위해 시스템 상태 전이 모델의 안정성 확보에 필요한 조건들을 식별하고 결함 트리를 구성할 수 있는 템플리트를 개발한다. 이 논문에서는 제안된 방법을 철도 건널목 제어 시스템에 적용한 결과도 기술한다.

Fault Tree Analysis(FTA) builds fault trees to perform safety analysis of systems. However, building fault trees depends on domain knowledge and expertize on target systems and consumes lots of time and efforts. In this paper, we propose a technique that builds fault trees systematically based on state-transition models which are software design artifacts. For the end, this paper identifies conditions that should be satisfied to guarantee safety of state-transition models and develop templates for fault tree construction. This paper also describes the results of appling the proposed method to railway crossing control system.

키워드

참고문헌

  1. H. A. Watson, Launch Control Safety Study, Technical report, Bell Telephone Laboratories, Murray Hill, NJ, 1961.
  2. W. Vesely, F. Goldberg, N. Roberts, and D. Haasl, Fault Tree Handbook, Technical Report NUREG-0492, U.S. Nuclear Regulatory Commission, 1981.
  3. M. Stamatelatos and W. Vesely, Fault Tree Handbook with Aerospace Applications, Technical Report of NASA, 2002(8).
  4. J. Xiang, K. Futatsugi, and Y. He. "Fault tree and Formal Methods in System Safety Analysis," In Proc. of The 4th International Conference on Computer and Information Technology, pp.1108-1115, Wuhan, China, 2004(9). https://doi.org/10.1109/CIT.2004.1357343
  5. N. G. Leveson, Stephen S. Cha, and Timothy J. Shimeall, "Safety Verification of Ada Programs Using Software Fault Trees," IEEE Software, pp.48-59, 1991(7). https://doi.org/10.1109/52.300036
  6. M. Towhidnejad, D. Wallace, and A. Gallo. "Fault Tree Analysis for Software Design," In Proc. of 28th Annual IEEE/NASA Software Engineering Workshop, 2003. https://doi.org/10.1109/SEW.2002.1199446
  7. K. Lano, D. Clark, and K. Androutsopoulos, "Safety and Security Analysis of Object Oriented Models," Lecture Notes in Computer Science, p.2434, pp.82-93. 2002. https://doi.org/10.1007/3-540-45732-1_10
  8. J. Gorski and B. Nowicki, "Object Oriented Approach to Safety Analysis," In Proc. of ENCRESS, pp.338-350, 1995.
  9. R. Hawkins, Ian Toyn and Iain Bate, "Critical Systems Development with UML," In Procs. of UML 2003 workshop, San Fransisco 2003.
  10. H. J. Kim, W. E. Wong, D. Vidroha Debroy, and B. Doohwan, "Bridging the Gap between Fault Trees and UML State Machine Diagrams for Safety Analysis," In Proc. of APSEC, pp.196-205, 2010. https://doi.org/10.1109/APSEC.2010.31
  11. P. Godefroid, Partial-Order Methods for the Verification of Concurrent Systems-An Approach to the State-Explosion Problem. University of Liege, Computer Science Department. Ph.D. Thesis.
  12. P. G. Frankl and E. J. Weyuker, "An applicable family of data flow testing criteria," IEEE Transactions on Software Engineering, Vol.14, No.10, pp.1483-1498, 1988. https://doi.org/10.1109/32.6194