Copyright 2004 - John C. Knight SOFTWARE ENGINEERING FOR DEPENDABLE SYSTEMS John C. Knight Department of Computer Science University of Virginia.

Slides:



Advertisements
Similar presentations
J. Kaiser University of Ulm Dept. Of Comp. Structures Jörg Kaiser Dept. Of Computer Structures University of Ulm And gets.
Advertisements

EECE499 Computers and Nuclear Energy Electrical and Computer Eng Howard University Dr. Charles Kim Fall 2013 Webpage:
Sponsored by the U.S. Department of Defense © 2005 by Carnegie Mellon University 1 Pittsburgh, PA Dennis Smith, David Carney and Ed Morris DEAS.
Session F4G - Computing Curricula: Computer Engineering Panel: Pradip K. Srimani, Clemson University David L. Soldan, Kansas State University John Impagliazzo,
Copyright (c) John Y. Cheung, 2002 ECE Recruiting,ppt Slide 1 What is an Electrical and Computer Engineer?
Introduction Designing cost-sensitive real-time control systems for safety-critical applications requires a careful analysis of the cost/fault-coverage.
Integrated Design and Analysis Tools for Software-Based Control Systems Shankar Sastry (PI) Tom Henzinger Edward Lee University of California, Berkeley.
NSF Foundations of Hybrid and Embedded Software Systems UC Berkeley: Chess Vanderbilt University: ISIS University of Memphis: MSI A New System Science.
CS599 Software Engineering for Embedded Systems1 Software Engineering for Real-Time: A Roadmap Presentation by: Mandar Samant Raghbir Singh Banwait.
Department of Electrical and Computer Engineering Texas A&M University College Station, TX Abstract 4-Level Elevator Controller Lessons Learned.
Presentation R. R. Lutz. Analyzing Software Requirements Errors in Safety-Critical Embedded Systems. In Proceedings of the IEEE International Symposium.
NSF Foundations of Hybrid and Embedded Software Systems UC Berkeley: Chess Vanderbilt University: ISIS University of Memphis: MSI A New System Science.
CSC 402, Fall Requirements Analysis for Special Properties Systems Engineering (def?) –why? increasing complexity –ICBM’s (then TMI, Therac, Challenger...)
12/01/041 « Engineering of complex systems » Ecole Polytechnique - Thales Daniel Krob December 2004 Presentation of the chair.
Annarita Giani, UC Berkeley Bruno Sinopoli & Aakash Shah, Carnegie Mellon University Gabor Karsai & Jon Wiley, Vanderbilt University TRUST 2008 Autumn.
Tim St. John Masters Computer Engineering Software Engineering Track.
Software Dependability CIS 376 Bruce R. Maxim UM-Dearborn.
Upstream Prerequisites
Dr. Tom WayCSC What is Software Engineering? CSC 4700 Software Engineering Lecture 1.
1 Autonomic Computing An Introduction Guenter Kickinger.
REAL-TIME SOFTWARE SYSTEMS DEVELOPMENT Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
Real-time systems Systems Refers to: (computing, communication, and information) (c) Rlamsal DWIT.
Michael Ernst, page 1 Collaborative Learning for Security and Repair in Application Communities Performers: MIT and Determina Michael Ernst MIT Computer.
High Performance Embedded Computing © 2007 Elsevier Chapter 1, part 4: Embedded Computing High Performance Embedded Computing Wayne Wolf.
Copyright © Clifford Neuman and Dongho Kim - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Advanced Operating Systems Lecture.
1 CS 501 Spring 2003 CS 501: Software Engineering Lecture 16 System Architecture and Design II.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
1. Introduction 1.1 Background 1.2 Real-time applications 1.3 Misconceptions 1.4 Issues in real-time computing 1.5 Structure of a real-time system.
High Performance Embedded Computing © 2007 Elsevier Lecture 5: Embedded Systems Issues Embedded Computing Systems Mikko Lipasti, adapted from M. Schulte.
Reliable Design of Safety Critical Systems Dr. Abhik Roychoudhury School of Computing
Programming Models & Runtime Systems Breakout Report MICS PI Meeting, June 27, 2002.
Communication Networks (Kommunikationsnetværk) Specialisations: Distributed Application Engineering Network Planning & Management Ole Brun Madsen Professor.
 Chapter 13 – Dependability Engineering 1 Chapter 12 Dependability and Security Specification 1.
Framework for the Development and Testing of Dependable and Safety-Critical Systems IKTA 065/ Supported by the Information and Communication.
MECHATRONICS PRESETATION BY ANGSHUMAN DEBRAJ & HRISHIKESH MEHTA.
Building Dependable Distributed Systems Chapter 1 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
REAL-TIME SOFTWARE SYSTEMS DEVELOPMENT Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
Page 1 Analysis of Asynchronous Systems Steven P. Miller Michael W. Whalen {spmiller, Advanced Computing Systems Rockwell.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
Software Testing and Quality Assurance Software Quality Assurance 1.
Networked Embedded and Control Systems WP ICT Call 2 Objective ICT ICT National Contact Points Mercè Griera i Fisa Brussels, 23 May 2007.
Department of Electronic Engineering Challenges & Proposals INFSO Information Day e-Infrastructure Grid Initiatives 26/27 May.
Chapter2 Networking Fundamentals
Department of Industrial Engineering Sharif University of Technology Session# 10.
1 These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 5/e and are provided with permission by.
Software Engineering1  Verification: The software should conform to its specification  Validation: The software should do what the user really requires.
1 Chap. 2 Protocol. 2 Communication model Simplified communication model  source node  gather data from sensor or switch using ADC (analog-to-digital.
Real-Time Systems, Events, Triggers. Real-Time Systems A system that has operational deadlines from event to system response A system whose correctness.
Center for Embedded Systems (CECS) Eli Bozorgzadeh Computer Science Department.
SensorWare: Distributed Services for Sensor Networks Rockwell Science Center and UCLA.
Design-Directed Programming Martin Rinard Daniel Jackson MIT Laboratory for Computer Science.
The Willow System Implementation John C. Knight University of Virginia Dennis Heimbigner University of Colorado Intrusion Tolerance Through Secure System.
Tolerating Intrusions Through Secure System Reconfiguration Dennis Heimbigner and Alexander Wolf University of Colorado at Boulder John Knight University.
CPSC 873 John D. McGregor Session 3 Requirements V & V.
Embedded System Design and Development Introduction to Embedded System.
Industrial Automation Part I Real Time Control Embedded Systems.
Lecture 1 What is Software Engineering? CSC 4700 Software Engineering
John D. McGregor Session 3 Requirements V & V
CS 21a: Intro to Computing I
Examples of Real-Time and Embedded Systems
Lesson 1: Overview of Sequential Control and Data Acquisition
The Vision of Autonomic Computing
Introduction to Micro Controllers & Embedded System Design
CS 501: Software Engineering Fall 1999
Safety-Critical Real-Time Support
Exam 1 review CS 360 Lecture 20.
Automated Analysis and Code Generation for Domain-Specific Models
© Oxford University Press All rights reserved.
Presentation transcript:

Copyright John C. Knight SOFTWARE ENGINEERING FOR DEPENDABLE SYSTEMS John C. Knight Department of Computer Science University of Virginia

Copyright John C. Knight Overview My General Interest: Systems that are REALLY important. Systems where failure means: injury, death, destruction, chaos, etc. Safety-critical Embedded Systems Crucial Application Networks Two halves of overall research program

Copyright John C. Knight Electronic Automobile Systems Brakes Suspension Engine Control Traction Control Steering Transmission By wire…With no physical backup…

Copyright John C. Knight Digital Fly By Wire Failure Rate < /hour Wire Not Plumbing....

Copyright John C. KnightPage 5 03/6/02 System Complexity M* 2M* Analog Avionics Hybrid Avionics Digital Avionics Integrated Digital Avionics Relative Complexity 1996 *Lines of Code From Steve Miller, Rockwell Collins

Copyright John C. Knight Critical Infrastructure These are safety-critical systems

Copyright John C. Knight Wide Area Augmentation System Free flight Precision approaches

Copyright John C. Knight Sizewell B Nuclear Plant Primary protection system 100,000 lines of code Over 600 processors…. 50,000 test cases “Failed” 52% Real problem was inability to determine correct response

Copyright John C. Knight Wide Area Augmentation System Original cost est. $892.4 Current estimate $2,900 Orig. del. date 1998 Current estimate 2003 Many other major modernization programs in similar states (STARS, AMASS)

Copyright John C. Knight What Are The Areas Of Research? Formal methods, especially specification System architectures Verification Tools Other miscellaneous things that are fun

Copyright John C. Knight Specification About 60% of defects in practice are specification errors Community solution approach: Formal languages, i.e., languages with semantics defined in mathematics Powerful mechanism for communication and analysis Rarely used…

Copyright John C. Knight The Situation At Present We think we understand this

Copyright John C. Knight The Situation In The Future

Copyright John C. Knight Specific Research Integration of formal and informal languages: They are different, both are needed in all systems How should they be combined? How do you analyze the combination? Embedded system survivability: Don’t make it reliable, make it survivable Complex combination of specification, analysis & arch Tool support: Powerful toolsets developed See:

Copyright John C. Knight SPECIFICATION Zeus Specification Tools Manipulation & Analysis Manipulation & Analysis Manipulation & Analysis Manipulation & Analysis Analysis: Symbol defns Symbols uses Invariants Etc. Analysis: Symbol defns Symbols uses Invariants Etc. MEANING Natural Language MEANING Natural Language FUNCTION Formal Language FUNCTION Formal Language MAP Formal Structure MAP Formal Structure

Copyright John C. Knight The Network Problem Very Large Networks Interdependent Networks Heterogeneous Nodes Non-Local Faults Sequential Faults

Copyright John C. Knight Survivability As Control Control Function “Sensor” Signals “Actuator” Commands From Sensors To Actuators

Copyright John C. Knight Dynamic Reconfiguration Single Component Reconfiguration ? ? ? Application Reconfiguration

Copyright John C. Knight Willow Architecture Logical View Reactive Active Control Active Control Proactive Active Management Active Management New Postures New Postures Commands Operator Administrator Intelligence Analysis Development Trust boundary During Attack Before and After Attack

Copyright John C. Knight Critical Networked Application Critical Networked Application Sensors Actuators Application State & Analysis Model Self Healing Tolerate Anticipated Faults Planned Posture Change System Update System Deployment External Input Approach to Fault Treatment

Copyright John C. Knight Critical Networked Application Critical Networked Application Sensors Actuators Willow Architectural Issues Hierarchic faults Control loop interactions: Asynchronous Priority & resources Conflicting goals Network scale: Volume of software State model Wide area change Exceptions and results: Dynamic app’l membership Absolute vs. statistical Result “harvesting” Target system actuation: Lightweight Standard interface & protocol Network State &Analysis Model Self Healing Tolerate Anticipated Faults Planned Posture Change System Update System Deployment External Input

Copyright John C. Knight Summary Lots of crucial applications—many more than most people think Very challenging engineering Very significant research problems Many exciting ideas here at UVA Lots of opportunities to contribute Breakout session: Thursday at 5:00PM Olsson 236D

Copyright John C. Knight Questions?