ATTRACT TWD Symposium, Barcelona, Spain, 1st July 2016

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Omnibus: A clean language and supporting tool for integrating different assertion-based verification techniques Thomas Wilson, Savi Maharaj, Robert G.
Chapter 4 Quality Assurance in Context
Software Fault Injection for Survivability Jeffrey M. Voas & Anup K. Ghosh Presented by Alison Teoh.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 20 Slide 1 Critical systems development.
Daily Tests - SAST March , © Ascom1 Daily Tests of Embedded Systems.
Testing Without Executing the Code Pavlina Koleva Junior QA Engineer WinCore Telerik QA Academy Telerik QA Academy.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
OOP #10: Correctness Fritz Henglein. Wrap-up: Types A type is a collection of objects with common behavior (operations and properties). (Abstract) types.
Regression testing Tor Stållhane. What is regression testing – 1 Regression testing is testing done to check that a system update does not re- introduce.
Bottom-Up Integration Testing After unit testing of individual components the components are combined together into a system. Bottom-Up Integration: each.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
0 Deterministic Replay for Real- time Software Systems Alice Lee Safety, Reliability & Quality Assurance Office JSC, NASA Yann-Hang.
Software faults & reliability Presented by: Presented by: Pooja Jain Pooja Jain.
CSCI 5801: Software Engineering
Dr. Pedro Mejia Alvarez Software Testing Slide 1 Software Testing: Building Test Cases.
Software Faults and Fault Injection Models --Raviteja Varanasi.
CSCE 548 Secure Software Development Risk-Based Security Testing.
Software Quality Assurance Lecture #8 By: Faraz Ahmed.
 The software systems must do what they are supposed to do. “do the right things”  They must perform these specific tasks correctly or satisfactorily.
CS 501: Software Engineering Fall 1999 Lecture 16 Verification and Validation.
Verification and Validation Overview References: Shach, Object Oriented and Classical Software Engineering Pressman, Software Engineering: a Practitioner’s.
Dr. Tom WayCSC Testing and Test-Driven Development CSC 4700 Software Engineering Based on Sommerville slides.
B. Todd et al. 25 th August 2009 Observations Since v1.
Secure Systems Research Group - FAU 1 Active Replication Pattern Ingrid Buckley Dept. of Computer Science and Engineering Florida Atlantic University Boca.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 20 Slide 1 Critical systems development 3.
Quality Assurance.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
CISC Machine Learning for Solving Systems Problems Presented by: Suman Chander B Dept of Computer & Information Sciences University of Delaware Automatic.
Software Engineering1  Verification: The software should conform to its specification  Validation: The software should do what the user really requires.
CS, AUHenrik Bærbak Christensen1 Critical Systems Sommerville 7th Ed Chapter 3.
LOGO TESTING Team 8: 1.Nguyễn Hoàng Khánh 2.Dương Quốc Việt 3.Trang Thế Vinh.
CSCI1600: Embedded and Real Time Software Lecture 28: Verification I Steven Reiss, Fall 2015.
IT System Administration Lesson 3 Dr Jeffrey A Robinson.
Facilitating testing and monitoring of number entry systems in medical devices Abigail Cauchi, Christian Colombo, Mark Micallef & Gordon Pace.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
Test Plan: Introduction o Primary focus: developer testing –Implementation phase –Release testing –Maintenance and enhancement o Secondary focus: formal.
Grigore Rosu Founder, President and CEO Professor of Computer Science, University of Illinois
Unit 17: SDLC. Systems Development Life Cycle Five Major Phases Plus Documentation throughout Plus Evaluation…
HNDIT23082 Lecture 09:Software Testing. Validations and Verification Validation and verification ( V & V ) is the name given to the checking and analysis.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 23 Slide 1 Software testing.
Testing Overview Software Reliability Techniques Testing Concepts CEN 4010 Class 24 – 11/17.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Costin Ionita, CERN for the ALICE DAQ collaboration ALICE Expert System ACAT 2013, Beijing, May 16 th – 21 st, 2013.
Week#3 Software Quality Engineering.
Tool Support for Testing
SOFTWARE TESTING Date: 29-Dec-2016 By: Ram Karthick.
CMSC 345 Defensive Programming Practices from Software Engineering 6th Edition by Ian Sommerville.
CSCE 548 Secure Software Development Risk-Based Security Testing
Regression Testing with its types
Testing Tutorial 7.
A scalable approach for Test Automation in Vector CAST/Manage with
Chapter 18 Maintaining Information Systems
Chapter 8 – Software Testing
Verification and Testing
Verification and Validation Overview
Security Engineering.
runtime verification Brief Overview Grigore Rosu
Critical Systems Validation
Design for Quality Design for Quality and Safety Design Improvement
Software testing strategies 2
Lecture 09:Software Testing
Testing and Test-Driven Development CSC 4700 Software Engineering
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
Course: Module: Lesson # & Name Instructional Material 1 of 32 Lesson Delivery Mode: Lesson Duration: Document Name: 1. Professional Diploma in ERP Systems.
Measure Reliability of Automation – using Machine learning
Test Case Test case Describes an input Description and an expected output Description. Test case ID Section 1: Before execution Section 2: After execution.
Regression testing Tor Stållhane.
Computer in Safety-Critical Systems
Presentation transcript:

ATTRACT TWD Symposium, Barcelona, Spain, 1st July 2016 Runtime Monitoring for the Diagnosis and Recovery of Complex Physical Systems G. Pace, C. Colombo, K. Vella, G. Valentino (University of Malta, Msida, Malta) G. De Cataldo, A. Franco (Istituto Nazionale di Fisica Nucleare, Bari, Italy) ATTRACT TWD Symposium, Barcelona, Spain, 1st July 2016

Introduction Murphy’s Law: Reliability and fault tolerance in the operation of critical systems is imperative to avoid financial setbacks or even loss of lives Software engineers try to test their software as much as possible… but very difficult to test huge software products thoroughly to ensure correct functionality. Such a system does not work in a vacuum, but in an environment for which it is impossible to simulate all possible variations. Murphy’s Law: Therac-25: a radiation therapy machine involved in 6 accidents in the 1980s. Patients given massive overdoses of radiation due to failure of software interlocks to protect against high-power beams. A 1-byte counter in a routine frequently overflowed, and if the operator provided an input at that moment, the interlock would fail.

Typical software analysis Many automated tools in or outside Integrated Development Environment (IDE) for code coverage, profiling, benchmarking.. Done at development phase, when bugs are cheaper to fix. Static testing: code reviews, walkthroughs, inspections. Dynamic testing: executing code for a given set of test cases.

What is Runtime Verification? The extraction of information from a running system, to detect and react to observed behaviours violating certain properties. Rather than inlining property checks via e.g. assertions, which interweaves the program with the specification of the properties to be satisfied, the two are separated.

How does Runtime Verification work? Runtime monitoring tool: modifies the system code to capture points of interest during execution. The specification is automatically converted into a monitor, which checks that the system behaviour does not violate the specification.

How does Runtime Verification work? Separation of the system and specification aspects allows for: Different teams working on the different aspects The use of the same specification across different versions, instances or systems Avoids possibility to introduce new bugs as complexity of inline checks increases E.g. isGasLeak variable should not have been true for more than 1 minute in the last 30 minutes just before induceSpark function is called..

Detector Control System: A use case for RV The ALICE High Momentum Particle Identification (HMPID) detector and ALICE-LHC interface control systems are based on the WinCC OA platform. Both are critical systems: issues with the detector (e.g. pressure, cooling, HV trips) could result in downtime or even damage issues with ALICE-LHC interface (e.g. DIP server status, disk space, manager status) could result errors in the production of parameter files for the physics runs. WinCC OA provides an event-driven platform for controlling and monitoring distributed physical devices and software services. These systems are modelled using state machines (SMI++) and the human end-user interacts with them through a GUI.

Detector Control System: A use case for RV In both cases, some degree of automatic problem diagnosis already exists through raising of alarms which are visible in the GUI. However, typically the recovery from single or multiple failures needs to rely on some form of human intervention, which costs time. Runtime monitoring is well-suited to ensuring, using the same specification input, that: the distributed WinCC system does not enter into any critical conditions that could be harmful for the detector or accelerator. the recovery from conditions which occur from time to time is performed automatically.

Our expertise in RV and DCS The Semantics and Verification Research Group (SVRG) at the University of Malta has been active in RV since 2005. RV applications that we worked on: Industrial financial transactions Telescope signal processing Computer vision (airport security) Already involved in various European projects e.g. Open Payments Ecosystem (Horizon 2020), ARVI COST Action. Many years of experience in the design, implementation and operation of detector control systems (HMPID & LHC_IF)