Discovering Unanticipated Software Output Modes
نویسنده
چکیده
Software risk management is particularly important when the target environment of the software is a safetycritical system. Adequate development standards and methods for building software functionally that is “close to correct” exist. But unfortunately, we often fail to imagine particular classes of system hazards that the software’s behavior could induce, because quite simply, we cannot foresee everything that could go wrong from the outset of a new project. And therefore we will fail to build in the needed software protection mechanisms against these hazards. This paper presents a software risk management technology that partially addresses this problem. Our technology is based on software fault injection’s unique ability to warn about software-induced hazards that were inadvertently overlooked during the creation of the software requirements and system-level hazard analysis. Softwareinduced hazards occur as a result of software behaviors that are unknown.
منابع مشابه
Requirements Analysis Using Forward and backward Search
The requirements analysis of critical software components often involves a search for hazardous states and failure modes This paper describes the integration of a forward search for consequences of reaching these forbidden modes with a backward search for contributing causes Results are reported from two projects in which the integrated search method was used to analyze the requirements of crit...
متن کاملRequirements Analysis Using Forward and BackwardSearchRobyn
The requirements analysis of critical software components often involves a search for hazardous states and failure modes. This paper describes the integration of a forward search for consequences of reaching these forbidden modes with a backward search for contributing causes. Results are reported from two projects in which the integrated search method was used to analyze the requirements of cr...
متن کاملUnanticipated Software Use by Adolescents Following Mandatory Adoption
This research proposes a model to predict unanticipated use of software by high school students after mandatory adoption. We define unanticipated use as voluntarily extending the use of a software product to new tasks and new settings after mandatory adoption for a specific task in a specific setting. We are basing our model on TAM2 (Venkatesh and Davis 2000), which is an extension of the origi...
متن کاملOn-line computer pharmacokinetics program: lessons learned from its failure.
Decision support computer technology (DST) embedded in laboratory or hospital information systems has great potential but has rarely been successful. Through studying a pharmacokinetic program that automatically extracted data without requiring manual data entry, we have identified several barriers to the successful implementation of DST. Manual data entry is a major barrier, but so is the entr...
متن کاملDiscovering known and unanticipated protein modifications using MS/MS database searching.
We present an MS/MS database search algorithm with the following novel features: (1) a novel protein database structure containing extensive preindexing and (2) zone modification searching, which enables the rapid discovery of protein modifications of known (i.e., user-specified) and unanticipated delta masses. All of these features are implemented in Interrogator, the search engine that runs b...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001