{"title":"An experience modeling critical requirements","authors":"C. Payne, A. Moore, D. Mihelcic","doi":"10.1109/CMPASS.1994.318448","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318448","url":null,"abstract":"Previous work at NRL demonstrated the benefits of a security modeling approach for building high assurance systems for particular application domains. This paper introduces an application domain called selective bypass that is prominent in certain network security solutions. We present a parameterized modeling framework for the domain and then instantiate a confidentiality model for a particular application, called the External COMSEC Adaptor (ECA), within the framework. We conclude with lessons we learned from modeling, implementing and verifying the ECA. Our experience supports the use of the application-based security modeling approach for high assurance systems.<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116402045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Case study: Applying formal methods to the Traffic Alert and Collision Avoidance System (TCAS) II","authors":"J. Britt","doi":"10.1109/CMPASS.1994.318468","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318468","url":null,"abstract":"Requirements State Machine Language (RSML) evolved from statecharts during the development of the Traffic Alert and Collision Avoidance System (TCAS) II system requirements specification. This paper describes RSML and the TCAS II system requirements specification, which was reverse-engineered from pseudocode. This case study illustrates how formal methods have been applied to a safety-critical system, improving the assurance of safety in three areas: product review, process and personnel certification, and functional testing.<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128719970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal methods and dependability assessment","authors":"V. Stavridou, S. Liu, B. Dutertre","doi":"10.1109/CMPASS.1994.318467","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318467","url":null,"abstract":"Formal methods are increasingly used for system development and their potential advantages for dependability assurance have been recognized. However, there has so far been no hard evidence to either support or refute the efficacy of formal methods in this respect. This paper discusses how the dependability of systems can be affected by the tree of formal methods in two respects. First, how and why formal methods can help ensure the dependability of systems, and second what uncertainties can affect their effectiveness in achieving dependability. Issues related to the assessment of formal methods such as assessment criteria an assessment model and the establishment of evaluation experiments are discussed.<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124359179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A formal model of several fundamental VHDL concepts","authors":"D. Goldschlag","doi":"10.1109/CMPASS.1994.318454","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318454","url":null,"abstract":"This paper presents a formal model of several fundamental concepts in VHDL including the semantics of individual concurrent statements, and groups of those statements, resolution functions, delta delays, and hierarchical component structuring. Based on this model, several extensions to VHDL are proposed including nondeterministic assignments and unbounded asynchrony. Nondeterminism allows the specification of environments and of classes of devices. This model naturally captures the meaning of composition of VHDL programs.<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"7 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120862444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Estimation of coverage probabilities for dependability validation of fault-tolerant computing systems","authors":"C. Constantinescu","doi":"10.1109/CMPASS.1994.318463","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318463","url":null,"abstract":"Dependability validation is a major step toward development of high-assurance computing systems. This paper addresses the problem of estimating the coverage probabilities by statistically processing the information collected through physical or simulated fault injection. 3-stage random sampling is employed to derive the means, variances and confidence intervals of the coverage probabilities. The statistical experiments are carried out in a 3D fault space that accounts for system inputs, fault injection times and fault locations. In the case of real-time systems, the inputs and the injection times also provide useful information about the workload to be executed. The proposed solution technique is tested against the data generated by a program that mimics a fault environment. Two application examples are considered. Several working rules for designing 3-stage random sampling experiments are also provided.<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"122 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129485537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"State minimization for concurrent system analysis based on state space exploration","authors":"Inhye Kang, Insup Lee","doi":"10.1109/CMPASS.1994.318461","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318461","url":null,"abstract":"A fundamental issue in the automated analysis of concurrent systems is the efficient generation of the reachable state space. Since it is not possible to explore all the reachable states of a system if the number of states is very large or infinite, we need to develop techniques for minimizing the state space. This paper presents our approach to cluster subsets of states into equivalent classes. We assume that concurrent systems are specified as communicating state machines with arbitrary data space. We describe a procedure for constructing a minimal reachability state graph from communicating state machines. As an illustration of our approach, we analyze a producer-consumer program written in Ada.<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121659164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal methods in the design of Ada 9X","authors":"D. Guaspari","doi":"10.1109/CMPASS.1994.318469","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318469","url":null,"abstract":"Several advisory groups have been established to provide suggestions and criticism to the Ada 9X Mapping Revision Team, the small design team that is revising the definition of the Ada programming language. One such group, the Language Precision Team, based its criticisms on attempts to construct formal mathematical models of the design. This paper reports on the first phase of that work.<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122013021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A development of hazard analysis to aid software design","authors":"J. Mcdermid, D. Pumfrey","doi":"10.1109/CMPASS.1994.318470","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318470","url":null,"abstract":"This paper describes a technique for software safety analysis which has been developed with the specific aim of feeding into and guiding design development. The method draws on techniques from the chemical industries' Hazard and Operability (HAZOP) analysis, combining this with work on software failure classification to provide a structured approach to identifying the hazardous failure modes of new software.<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130395544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Faulk, L. Finneran, J. Kirby, S. Shah, J. Sutton
{"title":"Experience applying the CoRE method to the Lockheed C-130J software requirements","authors":"S. Faulk, L. Finneran, J. Kirby, S. Shah, J. Sutton","doi":"10.1109/CMPASS.1994.318472","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318472","url":null,"abstract":"For safety-critical systems, regulatory and human concerns make assurance of requirements correctness a necessity. Most popular requirements methods rely heavily on expensive after-the-fact verification, validation and correction activities to attain a desired level of correctness. In cooperation with its industrial partners, the Software Productivity Consortium (the Consortium) has developed a rigorous requirements engineering method called CoRE (\"Consortium Requirements Engineering\"), building upon proven formal and object-oriented methods. As part of Continuous Process Improvement (CPI), Lockheed Aeronautical Systems Company (LASC) has incorporated CoRE into its C-130J aircraft program, to develop avionics system requirements. C-130J is a safety critical application. The results have verified the method's practicality and effectiveness at \"building in\" correctness during requirements analysis. They have further demonstrated that the benefits of a rigorous approach can be had without adversely affecting cost or schedule.<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"321 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122098552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Brocklehurst, B. Littlewood, T. Olovsson, E. Jonsson
{"title":"On measurement of operational security [software reliability]","authors":"S. Brocklehurst, B. Littlewood, T. Olovsson, E. Jonsson","doi":"10.1109/CMPASS.1994.318447","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318447","url":null,"abstract":"Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of 'the ability of the system to resist attack'. That is, it should be operational, reflecting the degree to which the system can be expected to remain free of security breaches under particular conditions of operation (including attack). Instead, current security levels at best merely reflect the extensiveness of safeguards introduced during the design and development of a system. Whilst we might expect a system developed to a higher level than another to exhibit 'more secure behaviour' in operation, this cannot be guaranteed; more particularly, we cannot infer what the actual security behaviour will be from knowledge of such a level. In the paper we discuss similarities between reliability and security with the intention of working towards measures of 'operational security' similar to those that we have for reliability of systems. Very informally, these measures could involve expressions such as the rate of occurrence of security breaches (cf. rate of occurrence of failures in reliability), or the probability that a specified 'mission' can be accomplished without a security breach (cf. reliability function). This new approach is based on the analogy between system failure and security breach, but it raises several issues which invite empirical investigation. We briefly describe a pilot experiment that we have conducted to judge the feasibility of collecting data to examine these issues.<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"274 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121387370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}