Looking at Code With Your Safety Goggles On

نویسنده

  • Ken Wong
چکیده

This paper presents a process for the refinement of safety-critical source code into a more tractable representation. For large software-intensive information systems, the safety engineering view of the system reveals a “long thin slice” of hazard-related software involving a number of different software components. The hazard-related software is documented in the system “safety verification case” which provides a rigorous argument for the safety of the source code. The refinement process creates a representation of the source code which isolates the relevant source code details. A hypothetical chemical factory information system is examined to illustrate aspects of this process and its

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

P14: How to Find a Talent?

Talents may be artistic or technical, mental or physical, personal or social. You can be a talented introvert or a talented extrovert. Learning to look for your talents in the right places and building those talents into skills and abilities might take some work, but going about it creatively will let you explore your natural abilities and find your innate talents. You’re not going to fin...

متن کامل

The Effect of Swimming Goggles on Intraocular Pressure and Blood Flow within the Optic Nerve Head

PURPOSE Goggles are frequently worn in the sport of swimming and are designed to form a seal around the periorbital tissue orbit. The resultant pressure on the eye may have the potential to affect intraocular pressure and blood flow of the optic nerve head. This study evaluates the influence of wearing swimming goggles on intraocular pressure (IOP) and blood flow of the ocular nerve head (ONH) ...

متن کامل

Requesting and Examining Computer Source Code

B efore making a discovery request for computer source code, an attorney should consult with the case's technical experts to decide what to request, and in what form. Your discovery request will turn on what claims are at issue : In different kinds of cases you will have different specific purposes for examining source code . In a patent infringement case, for example, you are looking for the p...

متن کامل

Dwarf Frankenstein is still in your memory: tiny code reuse attacks

Code reuse attacks such as return oriented programming and jump oriented programming are the most popular exploitation methods among attackers. A large number of practical and non-practical defenses are proposed that differ in their overhead, the source code requirement, detection rate and implementation dependencies. However, a usual aspect among these methods is consideration of the common be...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998