ARO Workshop Wendy Roll - May 2004 Topic 4: Effects of software certification on the current balance between software/system modeling, analysis and testing.

Slides:



Advertisements
Similar presentations
Jeremy S. Bradbury, James R. Cordy, Juergen Dingel, Michel Wermelinger
Advertisements

Web Services Architecture An interoperability architecture for the World Wide Service Network.
Kellan Hilscher. Definition Different perspectives on the components, behavioral specifications, and interactions that make up a software system Importance.
Chapter 2 The Software Process
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 24 Slide 1 Critical Systems Validation 2.
Presented by: Thabet Kacem Spring Outline Contributions Introduction Proposed Approach Related Work Reconception of ADLs XTEAM Tool Chain Discussion.
Dynamic Service Composition with QoS Assurance Feb , 2009 Jing Dong UTD Farokh Bastani UTD I-Ling Yen UTD.
May 11, ACL2 Panel: What is the Future of Theorem Proving? Arvind Computer Science & Artificial Intelligence Laboratory.
Building Reliable Software Requirements and Methods.
University of Southern California Center for Systems and Software Engineering ©USC-CSSE1 3/18/08 (Systems and) Software Process Dynamics Ray Madachy USC.
Ensuring Non-Functional Properties. What Is an NFP?  A software system’s non-functional property (NFP) is a constraint on the manner in which the system.
Creating Architectural Descriptions. Outline Standardizing architectural descriptions: The IEEE has published, “Recommended Practice for Architectural.
Dependent Types for Reasoning About Distributed Systems Paul Sivilotti - Ohio State Hongwei Xi - Cincinnati.
1 CMPT 275 Software Engineering Requirements Analysis Process Janice Regan,
Architectural Design Establishing the overall structure of a software system Objectives To introduce architectural design and to discuss its importance.
Basic Concepts The Unified Modeling Language (UML) SYSC System Analysis and Design.
Issues and Ideas in Software Reliability for FCS Joe Loyall BBN Technologies.
Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho Communications.
Expert System Presentation On…. Software Certification for Industry - Verification and Validation Issues in Expert Systems By Anca I. Vermesan Presented.
Verification and Validation Yonsei University 2 nd Semester, 2014 Sanghyun Park.
CSCE 548 Secure Software Development Risk-Based Security Testing.
Chapter 2 Software Process: A Generic View
Chapter 2 The process Process, Methods, and Tools
Assurance techniques for code generators Ewen Denney USRA/RIACS, NASA Ames Bernd Fischer ECS, U Southampton.
CLEANROOM SOFTWARE ENGINEERING.
Reliability Andy Jensen Sandy Cabadas.  Understanding Reliability and its issues can help one solve them in relatable areas of computing Thesis.
USING METADATA TO FACILITATE UNDERSTANDING AND CERTIFICATION ABOUT THE PRESERVATION PROPERTIES OF A PRESERVATION SYSTEM Jewel H. Ward, Hao Xu, Mike C.
Software Models (Cont.) 9/22/2015ICS 413 – Software Engineering1 -Component-based software engineering -Formal Development Model.
©Ian Sommerville 2000, Mejia-Alvarez 2009 Slide 1 Software Processes l Coherent sets of activities for specifying, designing, implementing and testing.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
1 New Development Techniques: New Challenges for Verification and Validation Mats Heimdahl Critical Systems Research Group Department of Computer Science.
Overview of Formal Methods. Topics Introduction and terminology FM and Software Engineering Applications of FM Propositional and Predicate Logic Program.
DYNAMIC VALIDITY PERIOD CALCULATION OF DIGITAL CERTIFICATES BASED ON AGGREGATED SECURITY ASSESSMENT By Alexander Beck Jens Graupmann Frank Ortmeier.
Johann Schumann and Pramod Gupta NASA Ames Research Center Bayesian Verification & Validation tools.
CHECKPOINTS OF THE PROCESS Three sequences of project checkpoints are used to synchronize stakeholder expectations throughout the lifecycle: 1)Major milestones,
Software Testing and Quality Assurance Software Quality Assurance 1.
Polymorphous Computing Architectures Run-time Environment And Design Application for Polymorphous Technology Verification & Validation (READAPT V&V) Lockheed.
Formal Methods in Software Engineering
Safety Critical Systems 5 Testing T Safety Critical Systems.
Systems Analysis and Design in a Changing World, Fourth Edition
Page 1 Advanced Technology Center HCSS 03 – April 2003 vFaat: von Neumann Formal Analysis and Annotation Tool David Greve Dr. Matthew Wilding Rockwell.
FDT Foil no 1 On Methodology from Domain to System Descriptions by Rolv Bræk NTNU Workshop on Philosophy and Applicablitiy of Formal Languages Geneve 15.
MODES-650 Advanced System Simulation Presented by Olgun Karademirci VERIFICATION AND VALIDATION OF SIMULATION MODELS.
Copyright © Richard N. Taylor, Nenad Medvidovic, and Eric M. Dashofy. All rights reserved. NFP Design Techniques Software Architecture Lecture 20.
Copyright © Richard N. Taylor, Nenad Medvidovic, and Eric M. Dashofy. All rights reserved. NFP Design Techniques Software Architecture Lecture 20.
Requirements Validation
High Confidence Software and Systems HCMDSS Workshop Brad Martin June 2, 2005.
From Information Assurance to Trusted Systems – A Strategic Shift Patricia A. Muoio Chief, NSA Trusted Systems Research (formerly known as National Information.
1 Software Testing Strategies: Approaches, Issues, Testing Tools.
Version 02U-1 Computer Security: Art and Science1 Correctness by Construction: Developing a Commercial Secure System by Anthony Hall Roderick Chapman.
Hosted by: Institute for Software Integrated Systems (ISIS) Vanderbilt University Software Reliability for FCS Discussion Format May 18-19, 2004 ARO Workshop.
Software Configuration Management SEII-Lecture 21
Industrial Avionics Working Group 18/04/07 The Relationship Between the Design and Safety Domains in IAWG Modular Certification Part 2: Completeness of.
Motivation FACE architecture encourages modularity of components on data boundaries Transport Services Segment interface is centered on sending and receiving.
Banaras Hindu University. A Course on Software Reuse by Design Patterns and Frameworks.
21/1/ Analysis - Model of real-world situation - What ? System Design - Overall architecture (sub-systems) Object Design - Refinement of Design.
Requirement Analysis SOFTWARE ENGINEERING. What are Requirements? Expression of desired behavior Deals with objects or entities, the states they can be.
Winter 2007SEG2101 Chapter 121 Chapter 12 Verification and Validation.
Reachability Testing of Concurrent Programs1 Reachability Testing of Concurrent Programs Richard Carver, GMU Yu Lei, UTA.
1 These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 5/e and are provided with permission by.
ARO Workshop Wendy Roll - May 2004 Topic 4: Effects of software certification on the current balance between software/system modeling, analysis and testing.
Choosing a Formal Method Mike Weissert COSC 481. Outline Introduction Reasons For Choosing Formality Application Characteristics Criteria For A Successful.
Basic Concepts of Software Architecture. What is Software Architecture? Definition: – A software system’s architecture is the set of principal design.
CSE 219 Final exam review.
CSCE 548 Secure Software Development Risk-Based Security Testing
Chapter 5 – Requirements Engineering
Software Verification and Validation
Critical Systems Validation
Software Architecture Lecture 20
Presentation transcript:

ARO Workshop Wendy Roll - May 2004 Topic 4: Effects of software certification on the current balance between software/system modeling, analysis and testing

ARO Workshop Wendy Roll - May Context  Traditional approach for certified software development has been to implement the system and then perform rigorous testing and analysis (post-creation) – Safety critical systems are designed to reduce this testing/analysis burden  Newer model-based approaches are intended to reduce errors and support analysis (pre-creation), but…  Certification processes require the same degree of confidence in all evidence used therein – E.g., when less direct methods are to be used for certification:  Any models, modeling tools, analysis tools, etc, must be certified to the same level as the underlying system, and  Fidelity of any system representations must be similarly certified for all applicable aspects (e.g. functionality, timing, concurrency) Certify?

ARO Workshop Wendy Roll - May Responses Concerned with  Applying certification criteria to larger scope of behavior – E.g. more dynamic behavior  Certification of “traditional” designs using non-system testing methods

ARO Workshop Wendy Roll - May Question 1  …What techniques are available which compellingly reduce the aggregate certification effort?  (Topic 2) – Formal Methods?  (Sylvester Fernandez) – Commoditized components may help  Issues of trust and confidence, rather than technology alone, must be addressed  (Richard Payne) – Modeling and simulation (discrete event simulation) could be used to represent the behavior of the system and this simulation could be certified in relation to requirements  (Fredrick Sheldon) – SPN/SAN Models

ARO Workshop Wendy Roll - May Question 2  …What unique approaches, if any, can more efficiently certify tools and representations than the system itself?  (Richard Payne) – Model-based testing – construct models of intended system behavior in the form of a sequence-based specification to validate system requirements are complete and correct. – Markov chain usage models- to generate a large sample of system software test cases of mission-based test scenarios – Model-based testing can be implemented at a relatively small cost compared to the overall software development and test budget as well as rework costs.

ARO Workshop Wendy Roll - May Question 3  …What aspects are most amenable to these approaches and techniques? – Can techniques address unique challenges resulting from mobile ad hoc networking or other system of system dynamics?  (Topic 2) – Concurrency – formal methods “proof of properties”  (Joe Loyall) – Increase the ability to certify dynamic systems by constraining their dynamism  Dynamically choosing from a set of certified static choices – If we can’t certify exactly correct behavior for highly dynamic systems, perhaps we can certify their limits – Can we certify the adaptive mechanisms that delimit behavior, recover, protect, or keep software operating within a “safe” subset of possibilities  (Richard Payne) – Usage modeling process aid in identifying possible combinations and configurations of the system operating in a variety of ways and documenting them explicitly in behavioral models – It can help not only to verify that the system functions correctly under dynamic conditions but also help to determine what those conditions are  (Chris Gill) – Reliable message delivery in the face of transient connectivity by exploiting motion and availability profiles

ARO Workshop Wendy Roll - May Question 4  …Are these approaches and techniques scalable to the size of FCS?  (Richard Payne) – The model-based testing approach has not been used on a program the scope of the UoA but from a modeling standpoint, it should be feasible – usage states can be captured in usage models with the latest available techniques – Major challenge is providing required test capabilities for large scale, automated testing – Without a robust, semi-automated test capability, it will be very difficult to ever measure the software reliability with any level of confidence  (Chris Gill) – If we can find ways to decompose the problem