Browse > Article
http://dx.doi.org/10.3745/KIPSTD.2007.14-D.6.633

Compositional Safety Analysis for Embedded Systems using the FSM Behavioral Equivalence Algorithm  

Lee, Woo-Jin (경북대학교 전자전기컴퓨터학부)
Abstract
As the embedded systems closely related with our living become complex by interoperating each other via internet, the safety issue of embedded systems begins to appear For checking safety properties of the system interactions, it is necessary to describe the system behaviors in formal methods and provide a systematic safety analysis technique. In this research, the behaviors of an embedded system are described by Labeled Transition Systems(LTS) and its safety properties are checked on the system model. For enhancing the existing compositional safety analysis technique, we perform the safety analysis techniques by checking the behavioral equivalence of the reduced model and a property model after reducing the system model in the viewpoint of the property.
Keywords
Safety Analysis; Embedded Systems; Compositional Analysis; Behavioral Equivalence Algorithm;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Nancy G. Leveson, Sofeware : System Safety and Computers, Addison-Wesley Publishing Company, 1995
2 S. C. Cheung, J. Kramer, 'Checking safety properties using compositional reachability analysis,' ACM TOSEM, pp. 49 78, 1999   DOI
3 P. J. Denning, et al., Machines, Languages, and Computation, Prentice Hall, 1978
4 Edward A. Addy, 'Methodology of independent software nuclear safety analysis,' Proc. of 5th International Symposium on Software Reliability Engineering, pp.76-83, Nov., 1994   DOI
5 K Sayre, J. Kenner, P.L. Jones, 'Safety models : an analytical tool for risk analysis of medical device systems,' Proc. of 14th IEEE Symposium on Computer-Based Medical Systems, pp.445-451, July 2001   DOI
6 A.C. Tribble, S.P. Miller, 'Software safety analysis of a flight management system vertical navigation function- a status report,' Proc. of the 22nd Digital Avionics Systems, Oct. 2003   DOI
7 A.C. Tribble, S.P. Miller, 'Software intensive systems safety analysis,' IEEE Aerospace and Electronic System Magazine, Vol.19, No.10, pp.21-26, Oct. 2004   DOI   ScienceOn
8 G. Parthasarathy, M.K. Iyer, K.T. Cheng, and L.C. Wang, 'Safety property verification using sequential SAT and bounded modeling checking,' IEEE Design and Test of Computers, Vol.21, No.2, pp.132-143, Mar-Apr., 2004   DOI   ScienceOn
9 W. Atkinson, J. Cunningham, 'Proving properties of a safety-critical system,' Software Engineering Journal, Vol.6, No.2, pp.41-50, Mar., 1991   DOI
10 Robin Milner, Communication and Concurrency, Prentice Hall, 1989
11 S. Uchitel, et al, 'Synthesis of behavioral models from scenarios,' IEEE trans. on software engineering, Vol.29, No.2, pp.99-115, 2003   DOI   ScienceOn
12 D. A. Huffman, 'The synthesis of sequential switching circuits,' Journal of Franklin Institute, 1954
13 D. Harel, 'Statcharts A visual formalism for complex systems,' Sci. Comput. Prog., Vol.8, pp.231-274, 1987   DOI   ScienceOn