© Copyright 2013 Rockwell Collins All rights reserved. Company Official and Proprietary Rockwell Collins and Formal Methods September 20, 2013.

Slides:



Advertisements
Similar presentations
Enabling Technology Innovation using Open Source Software
Advertisements

Trusted Computing in Government Networks May 16, 2007 Richard C. (Dick) Schaeffer, Jr. Information Assurance Director National Security Agency.
1 Multi-Function Multi-mode Digital Avionics (MMDA) NASA Glenn Research Center – End of FY05 Status Presented to ICAO ACP WGC-11 GRC/James Budinger September.
Chapter 1 Business Driven Technology
Thanks to Microsoft Azure’s Scalability, BA Minds Delivers a Cost-Effective CRM Solution to Small and Medium-Sized Enterprises in Latin America MICROSOFT.
Lesson 1: Introduction to IT Business and Careers
Aviation Safety ProgramSingle Aircraft Accident Prevention April NCC-1-377, Honeywell Tucson Design, Implementation, and Verification of Fault-Tolerant.
Dagstuhl Intro Mike Whalen. 2 Mike Whalen My main goal is to reduce software verification and validation (V&V) cost and increasing.
GENI: Global Environment for Networking Innovations Larry Landweber Senior Advisor NSF:CISE Joint Techs Madison, WI July 17, 2006.
© Copyright 2009 Rockwell Collins, Inc. All rights reserved. Formal Methods for Critical Systems Dr. Steven P. Miller Midwest Verification Day September.
INFORMATION SYSTEMS & GLOBAL SERVICES Craig Solem, CISSP Lockheed Martin Information Systems and Global Services Program Manager, Joint Medical information.
Sensor Systems Division Trusted Situational Awareness A System that Improves the Function and Security of Surveillance Systems used by Law Enforcement,
Advanced Technology Center Slide 1 Formal Verification of Flight Critical Software Dr. Steven P. Miller Advanced Computing Systems Elise A. Anderson Commercial.
Advanced Technology Center Slide 1 Formal Methods in Safety-Critical Systems Dr. Steven P. Miller Advanced Computing Systems Rockwell Collins 400 Collins.
Maritime Security: Our Approach. Who is CUBIC?  Cubic Corporation (Amex) is an innovative supplier of products, systems and services to government and.
Significant Work. Extraordinary People. SRA. Property Management Solutions for Unique Identification, AIT, and the Supply Chain March 30, 2011 Susan Pearson,
2003 Indigo Technology, Inc. All Rights Reserved Alliance Portfolio Computing Infrastructure Services Customer Relationship Management Engineering Services.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
Unified Logs and Reporting for Hybrid Centralized Management
MyCloudIT Removes the Complexity of Moving Cloud Customers’ Entire IT Infrastructures to Microsoft Azure – Including the Desktop MICROSOFT AZURE ISV: MYCLOUDIT.
With the Help of the Microsoft Azure Platform, Devbridge Group Provides Powerful, Flexible, and Scalable Responsive Web Solutions MICROSOFT AZURE ISV PROFILE:
Overview 4Core Technology Group, Inc. is a woman/ veteran owned full-service IT and Cyber Security firm based in Historic Petersburg, Virginia. Founded.
Of Cisco Development. Develop the Network as the Platform for Life’s Experiences Exploit Technology and Market Transitions Operational Excellence Changing.
National Information Assurance Partnership NIAP 2000 Building More Secure Systems for the New Millenium sm.
Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. PUBLIC PUBLIC CO900G Electrical Controls Engineering Career Paths University of.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
© Siemens AG, CT SE 1, Dr. A. Ulrich C O R P O R A T E T E C H N O L O G Y Research at Siemens CT SE Software & Engineering Development Techniques.
Model-Based Design & Analysis
1 As a public interest company, MITRE works in partnership with the government to address issues of critical national
CHIEF EXECUTIVE OFFICER KoolSpan, The Trust Company.
FY2011 Harris Corporation Overview Page 1 Harris Corporation Overview.
Copyright © 20XX Raytheon Company. All rights reserved. Fostering Indiana Technology Engaging In Long Term Partnerships Tim Morris
© Andrew IrelandDependable Systems Group ITI Techmedia and Technology Transfer Andrew Ireland Dependable Systems Group School of Mathematical & Computer.
1 New Development Techniques: New Challenges for Verification and Validation Mats Heimdahl Critical Systems Research Group Department of Computer Science.
Distribution limited to Jeppesen Personnel Jeppesen Proprietary - Copyright © 2011Jeppesen. All rights reserved. IMA Partnerships The Way Forward Rob Knapp.
Copyright© 2002 Avaya Inc. All rights reserved Anna Dorcey Director, Avaya DeveloperConnection Program August 4, 2004 Partnering in the VOIP World Anna.
Page 1 Advanced Technology Center HCSS 03 – April 2003 vFaat: von Neumann Formal Analysis and Annotation Tool David Greve Dr. Matthew Wilding Rockwell.
Randy Beavers CS 585 – Computer Security February 19, 2009.
© Copyright 2008 Rockwell Collins, Inc. All rights reserved. Proprietary Information Rockwell Collins SAE ACGSC Meeting 102 General Committee Briefing.
Built on Azure, Moodle Helps Educators Create Proprietary Private Web Sites Filled with Dynamic Courses that Extend Learning Anytime, Anywhere MICROSOFT.
CHAPTER 7 THE INTERNET AND INTRANETS 1/11. What is the Internet? 2/11 Large computer network ARPANET (Dept of Defense) It is international and growing.
High Confidence Software and Systems HCMDSS Workshop Brad Martin June 2, 2005.
From Information Assurance to Trusted Systems – A Strategic Shift Patricia A. Muoio Chief, NSA Trusted Systems Research (formerly known as National Information.
Revolutionized, Automated Cash and Gratuity Management for the Hospitality Industry, Thanks to Microsoft Azure MICROSOFT AZURE APP BUILDER PROFILE: Evention.
Page 1 Advanced Technology Center HCSS 03 – April 2003 A High-Assurance Partitioned Development Environment David Greve and Matthew Wilding Rockwell Collins.
Powered by Microsoft Azure, Auctori Is the Next Generation in Multilingual, Global, Search Engine Optimized Web Content Management Systems MICROSOFT AZURE.
Copyright © 2007 Raytheon Company. All rights reserved. Customer Success Is Our Mission is a trademark of Raytheon Company. May 2007 Company Overview.
1 I.U. Professional Opportunities Orientation Program Kristin Gaines Manager, Global Financial Support & Services.
Microsoft Azure Powers the Convenios e Obras Module for the Connected Government Solution, Which Can Integrate, Speed Up Decision-Making MICROSOFT AZURE.
I.U. Professional Opportunities Orientation Program Kristin Gaines IT Manager.
Built on the Powerful Microsoft Azure Platform, Forensic Advantage Helps Public Safety and National Security Agencies Collect, Analyze, Report, and Distribute.
Career Opportunities in IT Jeff Weaver. Cargill at a glance 85,000 employees 60 countries More than 1,000 locations $48 billion in gross sales Privately.
WHAT WE OFFER Go-To-Market Services Microsoft Azure Brings to Life Citizen Assistance, the Tech Solution That Improves Communication Between the People.
Embedded Systems - the Neural Backbone of Society ARTEMIS Industry Association ARTEMIS, from successful R&D to cutting-edge Innovation Rolf Ernst, TU Braunschweig.
Activu-Powered Video Wall Prominently Featured during President Obama’s Visit to the National Cybersecurity and Communications Integration Center On January.
© 2016 Catalyze, Inc. Go-To-Market Services HIPAA Compliance in the Cloud: Catalyze Provides Microsoft Azure Customers with a HITRUST Certified Platform-as-a-Service.
© 2016 Rockwell Collins. All rights reserved. Rockwell Collins Wellness Overview.
NeoFirma Taps into the Microsoft Azure Cloud Platform to Deliver Digital Oilfield SaaS to North American Independent Oil and Gas Producers MICROSOFT AZURE.
BU IS GIG Chemical, Oil & Gas
Strategic Partnerships to Increase Student and Faculty Opportunities
Windows Helps Enable Reliable Projections of Aircraft’s Technical & Operational Performance “Windows has enabled us to adapt our back office software for.
Crypteron is a Developer-Friendly Data Breach Solution that Allows Organizations to Secure Applications on Microsoft Azure in Just Minutes MICROSOFT AZURE.
MARMIND’s New Service Delivers a Single Centralized Marketing Plan That Connects Teams, Campaigns and Outcomes by Using the Power of the Azure Platform.
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
AIMS for BizTalk, Built on the Microsoft Azure Platform, Empowers Enterprises to Automate Insight and Analytics and Boost Value Creation MICROSOFT AZURE.
Zendos Tecnologia Utilizes the Powerful, Scalable
I4.0 in Action The importance of people and culture in the Industry 4.0 transformation journey Industry 4.0 Industry 3.0 Industry 2.0 Industry 1.0 Cyber.
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

© Copyright 2013 Rockwell Collins All rights reserved. Company Official and Proprietary Rockwell Collins and Formal Methods September 20, 2013

© Copyright 2013 Rockwell Collins All rights reserved. Company Official and Proprietary 2 Insert pictures into these angled boxes. Height should be 3.44 inches. Who we are: An innovator in the design, production and support of aerospace and defense solutions A global company operating from more than 60 locations in 27 countries 20,000 employees with 4700 engineers A balanced business across markets: Government 58%, Commercial 42% $4.7 billion in sales (2012) Our core competencies include... Communication/NavigationFlight Control Information Electronic Warfare Management Simulation Situational Awareness Rockwell Collins demonstrates a commitment to innovation with 9 % of sales as IR&D investment: Double the industry average

© Copyright 2013 Rockwell Collins All rights reserved. Company Official and Proprietary 3 Aviation Electronics and Airborne / Mobile Communications Systems for Commercial and Military Applications Worldwide Rockwell Collins

© Copyright 2013 Rockwell Collins All rights reserved. Company Official and Proprietary 4 Advanced Technology Center Charter: Identify, Develop and Mature Technologies that Provide Growth for Rockwell Collins Support Business Units in Evaluation of Advanced Technology Partner with Companies and Universities for Advanced Research Key Technology Areas: Formal Methods Networked Communication Systems Radio and Optical Systems Navigation and Control Avionics & Cabin Systems Information Assurance Automated Analysis Info & Computing Systems Modeling and Simulation

© Copyright 2013 Rockwell Collins All rights reserved. Company Official and Proprietary 5 Trusted Systems 18 Research Engineers Technical Expertise –Cyber Defense Operations –Information Assurance Encryption Data Separation Data Security –Formal Methods Thoerem Proving Model Checking Symbolic Execution

© 2013 Rockwell Collins, All rights reserved. Slide 6 Today Technology Progression in Avionics Technology PneumaticElectromechanicalAnalogDigital Federated Electronics Electromechanical and Pneumatic Instruments Optical Networking Technology Networked Avionics Avionics

© 2013 Rockwell Collins, All rights reserved. Slide 7 Software Complexity Explosion! Our customers have recognized this problem and are sounding the alarm!

© 2013 Rockwell Collins All rights reserved. Rockwell Collins Proprietary Information Utility of Formal Methods Ex post facto verification –Has been used to meet certification requirements Common Criteria EAL 6+ –Finds subtle errors Early detection of errors –Allows errors to be addressed early in design process –Less rework -> lower costs Increase of automation –Push button implementation, testing, and verification –Remove humans from tedious, error prone activities 8

© 2013 Rockwell Collins All rights reserved. Rockwell Collins Proprietary Information AAMP5 Microcode Verification (PVS) AAMP-FV Microcode Verification (PVS) AAMP5 Partitioning (PVS) JEM Java μProc (PVS) FGS Mode Confusion Study (PVS) FCP 2002 Microcode (ACL2) AAMP7 Separation Kernel (ACL2) FGS Mode Confusion PVS) FGS Safety Analysis (RSML -e, NuSMV) ADGS 2100 (Simulink, NuSMV) NASA Aviation Safety AFRL Greenhills Integrity RTOS (ACL2) Mixed Crit. Architectures vFaat (ACL2, PVS) NSA SHADE (ACL2) Turnstile (SPARK) Guardol App (ACL2, Prover) 2012 AF Crypto Mod Crypto Control (Prover) DataFlow Logic (ACL2) Cyber Seedling (ACL2) DARPA META (AADL) AVM (AADL) FM Application (Kind) Guardol (ACL2, Prover) CerTA FCS (NuSMV, Prover) System Arch Tools (AADL)

© 2013 Rockwell Collins All rights reserved. Rockwell Collins Proprietary Information FY 13 Formal Methods Projects CustomerProgram(complete) DARPAC2M2L (FY13) DARPAHACMS (FY17) DARPARapid (FY16) NASAAFCS (FY16) AFRLSwPI (FY15) NASAFCSR (FY13) AFRLCertaAMOR (ongoing) CPSDPikeWerks (FY13) SPAWARDornerWorks (FY14) InternalAuto Test (FY13) NSAGuardol (FY14) 10 Compositional reasoning Data flow analysis DO-178C formal methods guidebook example Requirements modeling and analysis Software cost reduction Robust firewall / guard

© 2013 Rockwell Collins All rights reserved. Rockwell Collins Proprietary Information Potential Formal Methods Application Areas Cyber –Vulnerability analysis –Cyber resilient design –Demonstrate salient properties of cyber payloads Unmanned Systems –Design, V&V of adaptive/autonomous behavior Rapid Capability Deployment –Insertion of new technology/capability into fielded high assurance systems 11

© 2013 Rockwell Collins All rights reserved. Rockwell Collins Proprietary Information Contact Information Corporate Web Site – – Formal Specification and Analysis Job Posting – Ray Richards –