Looking at Code With Your Safety Goggles On
نویسنده
چکیده
This paper presents a process for the refinement of safety-critical source code into a more tractable representation. For large software-intensive information systems, the safety engineering view of the system reveals a “long thin slice” of hazard-related software involving a number of different software components. The hazard-related software is documented in the system “safety verification case” which provides a rigorous argument for the safety of the source code. The refinement process creates a representation of the source code which isolates the relevant source code details. A hypothetical chemical factory information system is examined to illustrate aspects of this process and its
منابع مشابه
USAARL Report No. 94-28 Switching from Forward-Looking to Night Vision Goggles: Transitory Effects on Visual Resolution
متن کامل
P14: How to Find a Talent?
Talents may be artistic or technical, mental or physical, personal or social. You can be a talented introvert or a talented extrovert. Learning to look for your talents in the right places and building those talents into skills and abilities might take some work, but going about it creatively will let you explore your natural abilities and find your innate talents. You’re not going to fin...
متن کاملThe Effect of Swimming Goggles on Intraocular Pressure and Blood Flow within the Optic Nerve Head
PURPOSE Goggles are frequently worn in the sport of swimming and are designed to form a seal around the periorbital tissue orbit. The resultant pressure on the eye may have the potential to affect intraocular pressure and blood flow of the optic nerve head. This study evaluates the influence of wearing swimming goggles on intraocular pressure (IOP) and blood flow of the ocular nerve head (ONH) ...
متن کاملRequesting and Examining Computer Source Code
B efore making a discovery request for computer source code, an attorney should consult with the case's technical experts to decide what to request, and in what form. Your discovery request will turn on what claims are at issue : In different kinds of cases you will have different specific purposes for examining source code . In a patent infringement case, for example, you are looking for the p...
متن کاملDwarf Frankenstein is still in your memory: tiny code reuse attacks
Code reuse attacks such as return oriented programming and jump oriented programming are the most popular exploitation methods among attackers. A large number of practical and non-practical defenses are proposed that differ in their overhead, the source code requirement, detection rate and implementation dependencies. However, a usual aspect among these methods is consideration of the common be...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1998