West Virginia University Architectural-Level Risk Analysis for UML Dynamic Specifications Dr. Sherif M. Yacoub Hewlett-Packard Laboratories.

Slides:



Advertisements
Similar presentations
DETAILED DESIGN, IMPLEMENTATIONA AND TESTING Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
Advertisements

HP Quality Center Overview.
IEC Substation Configuration Language and Its Impact on the Engineering of Distribution Substation Systems Notes Dr. Alexander Apostolov.
® IBM Software Group © 2006 IBM Corporation Rational Software France Object-Oriented Analysis and Design with UML2 and Rational Software Modeler 04. Other.
Logic Based LSC Consistency Testing Presenter: Anup Niroula.
Software Testing and Reliability Reliability and Risk Assessment Aditya P. Mathur Purdue University August Corporation Minneapolis/St Paul,
Process Scheduling for Performance Estimation and Synthesis of Hardware/Software Systems Slide 1 Process Scheduling for Performance Estimation and Synthesis.
Scheduling with Optimized Communication for Time-Triggered Embedded Systems Slide 1 Scheduling with Optimized Communication for Time-Triggered Embedded.
Architecture and Real Time Systems Lab University of Massachusetts, Amherst An Application Driven Reliability Measures and Evaluation Tool for Fault Tolerant.
Software Engineering I Object-Oriented Design
Modeling State-Dependent Objects Using Colored Petri Nets
SQM - 1DCS - ANULECTURE Software Quality Management Software Quality Management Processes V & V of Critical Software & Systems Ian Hirst.
West Virginia University A Bayesian Approach to Reliability Predication of Component Based Systems H. Singh, V. Cortellessa, B. Cukic, E. Gunel, V. Bharadwaj.
Methodology for Architectural Level Reliability Risk Analysis Lalitha Krothapalli CSC 532.
What Exactly are the Techniques of Software Verification and Validation A Storehouse of Vast Knowledge on Software Testing.
Basic Concepts The Unified Modeling Language (UML) SYSC System Analysis and Design.
Software Architecture Risk Assessment (SARA) Tool Khader Basha Shaik Problem Report Defense Master of Science in Computer Science Lane Department of Computer.
University of Toronto Department of Computer Science © 2001, Steve Easterbrook CSC444 Lec22 1 Lecture 22: Software Measurement Basics of software measurement.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
Relex Reliability Software “the intuitive solution
Implementation Yaodong Bi. Introduction to Implementation Purposes of Implementation – Plan the system integrations required in each iteration – Distribute.
IV&V Facility 1 FY2002 Initiative: Software Architecture Metrics Hany Ammar, Mark Shereshevsky, Nicholay Gradetsky, Diaa Eldin Nassar, Walid AbdelMoez,
University of Coimbra, DEI-CISUC
Software Architecture Metrics Hany Ammar, Mark Shereshevsky, Ali Mili, Walid Rabie and Nicholay Gradetsky Lane Department of Computer Science & Electrical.
VTT-STUK assessment method for safety evaluation of safety-critical computer based systems - application in BE-SECBS project.
Research Heaven, West Virginia 1 FY 2004 Initiative: Risk Assessment of Software Architectures Hany Ammar, Katerina Goseva-Popstojanova, Ajith Guedem,
IV&V Facility PI: Katerina Goseva – Popstojanova Students: Sunil Kamavaram & Olaolu Adekunle Lane Department of Computer Science and Electrical Engineering.
UML Diagrams: Class Diagrams The Static Analysis Model Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
Research Heaven, West Virginia 1 FY 2003 Initiative: IV&V of UML Hany Ammar, Katerina Goseva-Popstojanova, V. Cortelessa, Ajith Guedem, Kalaivani Appukutty,
A performance evaluation approach openModeller: A Framework for species distribution Modelling.
Lecture: Reliability & FMECA Lecturer: Dr. Dave Olwell Dr. Cliff Whitcomb, CSEP System Suitability.
Bayesian Macromodeling for Circuit Level QCA Design Saket Srivastava and Sanjukta Bhanja Department of Electrical Engineering University of South Florida,
Modeling Shari L. Pfleeger and Joanne M. Atlee, Software Engineering: Theory and Practice, 4 th edition, Prentice Hall, Hans Van Vliet, Software.
Software Engineering 2 Software Testing Claire Lohr pp 413 Presented By: Feras Batarseh.
IV&V Facility 1 FY 2002 Initiative IV&V of UML Hany Ammar, Katerina Goseva-Popstojanova, V. Cortelessa, Ajith Guedem, Diaa Eldin Nassar, Walid AbdelMoez,
The Static Analysis Model Class Diagrams Prof. Hany H. Ammar, CSEE, WVU, and Dept. of Computer Science, Faculty of Computers and Information, Cairo University.
1 West Virginia University FY2001 University SOFTWARE INITIATIVE PROPOSAL for the NASA SOFTWARE IV&V FACILITY Initiative Title: Verification & Validation.
West Virginia University OOA Case Study: Pacemaker  A cardiac Pacemaker is an implanted device that assists cardiac functions when the underlying pathologies.
Research Heaven, West Virginia 1 FY 2004 Initiative: Risk Assessment of Software Architectures Hany Ammar, Katerina Goseva-Popstojanova, Ajith Guedem,
Research Heaven, West Virginia FY2003 Initiative: Hany Ammar, Mark Shereshevsky, Walid AbdelMoez, Rajesh Gunnalan, and Ahmad Hassan LANE Department of.
MODES-650 Advanced System Simulation Presented by Olgun Karademirci VERIFICATION AND VALIDATION OF SIMULATION MODELS.
Software Architecture Risk Assessment (SARA) Tool Khader Shaik, Wallid Abdelmoez, Dr. Hanny Ammar Lane Department of Computer Science and Electrical Engineering,
Measurement and quality assessment Framework for product metrics – Measure, measurement, and metrics – Formulation, collection, analysis, interpretation,
Using Social Network Analysis Methods for the Prediction of Faulty Components Gholamreza Safi.
Center for Reliability Engineering Integrating Software into PRA B. Li, M. Li, A. Sinha, Y. Wei, C. Smidts Presented by Bin Li Center for Reliability Engineering.
DESIGN OF SOFTWARE ARCHITECTURE
West Virginia University Sherif Yacoub, Hany H. Ammar, and Ali Mili A UML Model for Analyzing Software Quality Sherif Yacoub, Hany H. Ammar, and Ali Mili.
By: Gang Zhou Computer Science Department University of Virginia 1 Medians and Beyond: New Aggregation Techniques for Sensor Networks CS851 Seminar Presentation.
Library Online Resource Analysis (LORA) System Introduction Electronic information resources and databases have become an essential part of library collections.
Higher Computing Science 2016 Prelim Revision. Topics to revise Computational Constructs parameter passing (value and reference, formal and actual) sub-programs/routines,
SENG521 (Fall SENG 521 Software Reliability & Testing Preparing for Test (Part 6a) Department of Electrical & Computer Engineering,
A Hierarchical Model for Object-Oriented Design Quality Assessment
Software Design Refinement Using Design Patterns
Research Heaven, West Virginia
“<Fill in your definition here.>”
UML Diagrams: Class Diagrams The Static Analysis Model
Definition CASE tools are software systems that are intended to provide automated support for routine activities in the software process such as editing.
Instructor: Dr. Hany H. Ammar
Software Risk Assessment based on UML models
Constructive Cost Model
Chapter 5: Software effort estimation- part 2
Software Architecture Risk Assessment (SARA) Tool
by Xiang Mao and Qin Chen
Introduction to Pattern Oriented Analysis and Design (POAD)
ECE 753: FAULT-TOLERANT COMPUTING
Methodology for Architectural Level Reliability Risk Analysis
UML Diagrams: StateCharts The Dynamic Analysis Model
© Oxford University Press All rights reserved.
A Cross-layer Monitoring Solution based on Quality Models
Deployment Optimization of IoT Devices through Attack Graph Analysis
Presentation transcript:

West Virginia University Architectural-Level Risk Analysis for UML Dynamic Specifications Dr. Sherif M. Yacoub Hewlett-Packard Laboratories Palo Alto, CA Alaa Ibrahim, and Hany H. Ammar Department of Computer Science and Electrical Engineering West Virginia University 9 th International Conference on Software Quality Management, SQM th -20 th April, 2001 Loughborough University, Loughborough, England

West Virginia University Outline  Research Objectives  Methodology  Towards an Automated Methodology  Process  Case Study: The Pacemaker example  Conclusions

West Virginia University  Architectural-Level Risk Assessment Methodology at the early stages of development (S. Yacoub, H. Ammar. ISSRE'00, IEEE Comp. Soc., October, 2000)  Automated Environment Automated Risk Assessment Research Objectives

West Virginia University Automated Risk Assessment (continued) Architectural-Level Risk Assessment Methodology (S. Yacoub, H. Ammar. ISSRE'00, IEEE Comp. Soc., October, 2000) Utilizes: Dynamic Metrics: Component Complexity cpx i Connector Complexity cpx ij (S. Yacoub, H. Ammar, and T. Robinson. Metrics'99, November 1999) Failure Mode Effect Analysis FMEA (MIL_STD 1629A to define Component Severity svrty i Connector Severity svrty ij) Component Dependency Graphs CDG (adopted from: S. Yacoub, B. Cukic, and H. Ammar. ISSRE'99 November 1999) Defines: Heuristic Component Risk Factor hrf i = cpx i x svrty i Heuristic Connector Risk Factor hrf ij = cpx ij x svrty ij Risk Aggregation Algorithm that produces HRF appl

West Virginia University Model the architecture of the system using simulation models (UML-RT). Perform complexity analysis using simulation traces. Perform severity analysis using FMEA and simulation runs. Develop heuristic risk factors for components and connectors. Develop Components Dependency Graph for risk assessment purposes. (System/Subsystems) Aggregate the risk factors using the graph traversal algorithm. Automated Risk Assessment Architectural-Level Risk Assessment Methodology (continued) 6 Steps

West Virginia University Component Complexity Factors Connector complexity Factors CDG “ hrf i and hrf ij unidentified” Formatted Excel charts Violation Tables UML Simulation Environment Simulation Settings Simulation Log and Violation Report Analysis Tool Timing Diag. Violation Table Analyst Rose Real Time tool Text File MS Excel Processing Macro Inspection Viewing Macro UML Model Observer Sub Run Settings Analysis Tool HRF MS Excel Risk Macro Excel sheets Severity Ranking Severity Analysis (Failure/Effect analysis) Automated Risk Assessment (continued) Automated Environment CARA Tool

West Virginia University  Model the architecture of the system together with the risk logging capability using Rose RealTime.  Adjust the simulation runs in the observer as desired.  Run the simulation and get two log files containing: Component complexities. Component Execution Time. A log of all the messages exchanged. Automated Risk Assessment Automated Environment (continued) Process

West Virginia University  Process the log with Excel Risk Macro and get: Transition Probabilities. Connector complexities. CDG “where Risk Factors = Severity Factors * Complexity Factors (hrf i = cpx i x svrty i )”  Perform severity analysis using FMEA and simulation runs.  Traverse the CDG using the Excel traversal macro. Automated Risk Assessment Automated Environment Process (continued)

West Virginia University Example: Pacemaker Main Use Case Diagram

West Virginia University 1) Develop a Simulation Model Capsule Diagram Example: Pacemaker

West Virginia University Atrial statechart Case Study: Pacemaker (continued)

West Virginia University Atrial statechart Case Study: Pacemaker (continued)

A sequence diagram for the AVI scenario

A sequence diagram for the Programming scenario ProgrammerReedSwitchCoilDriverCommunication Gnome AtrialVentricular ApplyMagnet EnableComm Pulse Receiving IDLE Pulse Count++, ResetTimer BitTimeout Decode(Count) Store Bit in Byte Byte Full? enqueue(byte) Yes ByteTimeOut Waiting for Bit IDLE Count = 1, SetTimer Pulse Count =0 Receiving ByteTimeOut OR IDLE Waiting For Byte Validating IsValid? Processing ToAVI ToON ToAVI Yes HerezaByte(ACK) No HerezaByte(NAK) Waiting to Transmit Waiting to Send Next Byte

West Virginia University 2) Perform Complexity Analysis A Transition between Composite States in a component’s Statechart Operational Complexity of a component using the scenario profile and its complexity per scenario.

West Virginia University 2) Perform Complexity Analysis (cont’d) A) Quantify Component Complexity Factors using dynamic complexity metrics.

West Virginia University 2) Perform Complexity Analysis (cont’d) Export Object Coupling (EOC) EOC with scenario profiles OQFS with scenario profiles the export coupling for component C i with respect to component C j, is the percentage of the number of messages sent from C i to C j with respect to the total number of messages exchanged during the execution of the scenario x

West Virginia University 2) Perform Complexity Analysis (cont’d) B) Quantify Connector Complexity Factors using dynamic coupling metrics.

West Virginia University 3) Perform Severity Analysis  In performing severity analysis, each potential failure mode is ranked according to the consequences of that failure mode.  Steps: Identifying Failure Modes  Failure modes of individual components. (Functional faults and state-based faults)  Failure modes of individual connectors. (Interface fault analysis)

West Virginia University 3) Perform Severity Analysis (cont’d)  Steps (cont’d): Conducting Effect Analysis  Inject the fault.  Simulate the faulty model.  Monitor output and compare to expected output.  Identify the effect of the fault. Rank Severity  Identify category: Minor, Marginal, Critical, or Catastrophic.  Assign severity index to each component i as (svrty i ), which takes a value of 0.25, 0.50, 0.75, and 0.95

West Virginia University  Worst case severity found for the RS, CD, CG, VT, and AR are Minor(0.25), Minor(0.25), Marginal(0.50), Catastrophic(0.95) and Catastrophic (0.95), respectively FMEA table for the Pacemaker components

West Virginia University FMEA table for the Pacemaker connectors

West Virginia University 4) Develop Risk Factors hrf i = cpx i x svrty i where: 0 <= cpx i <= 1, is the normalized complexity level (dynamic complexity for components or dynamic coupling for connectors), and 0<= svrty i < 1, is the severity level for the architecture element. Risk Factors for the components in the example

West Virginia University 4) Develop Risk Factors (cont’d) Comparison between risk factors based on static and dynamic metrics Risk Factors for the connectors in the pacemaker example

West Virginia University 5) Constructing the CDG

West Virginia University 6) Risk Aggregation Algorithm  The algorithm expands all branches of the CDG starting from the start node.  The breadth expansions of the graph represent logical "OR" paths. translated as the summation of aggregated risk factors weighted by the transition probability along each path.  The depth of each path represents the sequential execution of components: is given by the aggregate: HRF = 1 -  i (1- hrf i )

West Virginia University Risk Aggregation Algorithm Procedure AssessRisk Parameters consumes CDG, AE appl,(average execution time for the application) produces Risk appl Initialization: R appl = R temp = 1 (temporary variables for (1-RiskFactor) ) Time = 0 Algorithm push tuple, Time, R temp while Stack not EMPTY do pop, Time, R temp if Time > AE appl or C i = t;(terminating node) R appl += R temp ;(an OR path) else   children(C i ) push (, Time += EC i, R temp = R temp *(1-hrf i )*(1-hrf ij )*PT ij ) ( AND path) end end while Risk appl = 1- R appl end Procedure AssessRisk

West Virginia University Risk Aggregation Algorithm  The algorithm can be used for System-level Risk Assessment  The risk of the pacemaker that is found to be ~ 0.9 Subsystem-level Risk Comparison  Complex systems are composed of many subsystems.  The algorithm can be used to obtain a risk factor for a subsystem using risk factors of its individual components.  Compare risk factors of individual subsystems. Sensitivity Analysis  Sensitivity to Uncertainties in Component Risk Factors  Sensitivity to Uncertainties in Connector Risk Factors

West Virginia University Sensitivity Analysis The Pacemaker risk factor as function of connector risk factors (one at a time) The Pacemaker risk factor as function of component risk factors (one at a time)

West Virginia University Benefits  The approach helps in: Deciding which components in the architecture require more development resources. Deciding which connectors in the architecture are of highest risk. A high risk connector indicates that the interfaces between the corresponding components and the messaging protocol should be carefully designed. Studying how uncertainties in component risk factors affect the overall risk value of the system. Studying how uncertainties in connector risk factors affect the overall risk value of the system.

West Virginia University Conclusion : Benefits  The methodology is applicable early at the architectural level.  The methodology is based on dynamic metrics. We use dynamic metrics to account for the fact that a fault in a frequently executed component will frequently manifest itself into a failure.  The methodology is based on simulation of architecture models. Simulation helps in: Performing FMEA procedures. Calculating the CDG parameters such as probability of transitions. Obtaining dynamic metrics.

West Virginia University Conclusion : Issues  Using ordinal scale for measuring severity.  Effect of uncertainties in the scenario probabilities and the estimated average execution times.  Scalability issues, applying the methodology to a larger case study.  Methodology is limited to systems with statechart and sequence diagram specifications.

Questions...

West Virginia University Main Use Case Diagram