A safety-focused verification using software fault trees
نویسندگان
چکیده
When developing safety-critical software such as reactor protection systems (RPS) in nuclear power plants, a demonstration of software trust (e.g., safety) is not only absolutely essential but also usually mandated by government authorities. While automated generation of fault trees has become possible with increased use of formal specifications, industrial use of fault trees has been limited primarily to safety demonstrations that the system is free from behavior captured in the root node. In this paper, we propose to extend the use of automated fault tree for verification purposes. As a fault tree represents an abstract and partial behavioralmodel of software on credible causes leading to a hazard, itmust still satisfy various properties (e.g., fairness, correctness). Verification of a fault tree is useful when developing safety-critical software because (1) it strengthens a safety-focused software development process; (2) it provides an opportunity to detect potentially critical errors early; and (3) it is less likely to experience a state explosion problem. This paper demonstrates how to convert a fault tree into a semantically equivalent logic formula so that they can be subject to formal verification using tools like Verification Interacting with Synthesis (VIS). We evaluated the feasibility of FTA’s applicability as a verification tool on a prototype model of a nuclear power reactor protection system (RPS) software to be deployed in plants under construction in
منابع مشابه
NuFTA: A CASE Tool for Automatic Software Fault Tree Analysis
Software fault tree analysis (SFTA) [1] is widely used for analyzing software requiring high-reliability. In SFTA, experts predict failures of system through HAZOP (Hazard and Operability study) or FMEA (Failure Mode and Effects Analysis) and draw software fault trees about the failures. Quality and cost of the software fault tree, therefore, depend on knowledge and experience of the experts. T...
متن کاملA Model-Oriented Approach to Safety Analysis Using Fault Trees and a Support System
Fault tree technique has been used in industry for safety analysis of safety critical systems for decades. They can be used for analysing the safety of both software and hardware. However, there are a lot of problems in ensuring the internal consistency and validity of fault trees constructed due to the absence of appropriate approach of using fault tree technique. This paper describes a model-...
متن کاملThe application of software and safety engineering techniques to security protocol development
Security protocols are series of steps designed to achieve a particular aim, whilst also providing security functions. However, despite extensive research, protocols are still being designed which are susceptible to common flaws and attacks. Much of the research in this area has focused on protocol verification and, to a lesser extent, protocol design. Many comparisons have been made between so...
متن کاملState-Event-Fault-Trees - A Safety Analysis Model for Software Controlled Systems
Safety models for software-controlled systems should be intuitive, compositional and have the expressive power to model both software and hardware behaviour. Moreover, they should provide quantitative results for failure or hazard probabilities. Fault trees are an accepted and intuitive model for safety analysis, but they are incapable of expressing state dependencies or temporal order of event...
متن کاملAligning Cyber-Physical System Safety and Security
Safety and security are two key properties of Cyber-Physical Systems (CPS). Safety is aimed at protecting the systems from accidental failures in order to avoid hazards, while security is focused on protecting the systems from intentional attacks. They share identical goals – protecting CPS from failing. When aligned within a CPS, safety and security work well together in providing a solid foun...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Future Generation Comp. Syst.
دوره 28 شماره
صفحات -
تاریخ انتشار 2012