Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance最新文献

筛选
英文 中文
Centurion software fault tolerance design and analysis tool 百夫长软件容错设计分析工具
Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance Pub Date : 1994-06-27 DOI: 10.1109/CMPASS.1994.318464
G. Wakefield, R. Dziegiel, L. Pullum
{"title":"Centurion software fault tolerance design and analysis tool","authors":"G. Wakefield, R. Dziegiel, L. Pullum","doi":"10.1109/CMPASS.1994.318464","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318464","url":null,"abstract":"Describes the Centurion computer-aided software fault tolerance design and analysis tool. The tool is a product of a research and development project focused on automated tools for use in design, assessment, and insertion of software fault tolerance techniques into Air Force systems. The Centurion tool allows users to analyze developmental and fielded software, and the associated computer and communications hardware, to identify fault tolerance requirements and evaluate alternative fault tolerant designs. The Centurion capabilities include interactive graphic construction software, hardware, and fault tolerance models; storage and retrieval of template and model libraries; simulation of the constructed models, with data logging and run-time user inputs permitted; and post-processing with tabular and graphic output formats available. Actual software modules can be associated with nodes within Centurion graphs and linked into the model simulation. The current Centurion tool is available on Sun SPARCStations, and is currently being ported to DEC Alpha workstations.<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132002166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of an informal program verification method to Ada 在 Ada 中应用非正式程序验证方法
Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance Pub Date : 1994-06-27 DOI: 10.1109/CMPASS.1994.318465
B. Wieand, W. Howden
{"title":"Application of an informal program verification method to Ada","authors":"B. Wieand, W. Howden","doi":"10.1109/CMPASS.1994.318465","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318465","url":null,"abstract":"The QDA informal program verifcation method is a comments analysis technique in which an analyst's assumptions about a program are expressed in the form of structured comments in the program and are checked by an analyzer. Previous work has shown QDA to be effective for detecting errors in assembly language programs. An experiment was performed to determine how well QDA would scale to high-level languages. The implementation and use of a prototype analyzer for Ada indicated both the usefulness of QDA for high level languages and the desirability for further development of the prototype.<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"97 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131277944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AeSOP: an interactive failure mode analysis tool AeSOP:交互式失效模式分析工具
Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance Pub Date : 1994-06-27 DOI: 10.1109/CMPASS.1994.318471
S. S. Cha
{"title":"AeSOP: an interactive failure mode analysis tool","authors":"S. S. Cha","doi":"10.1109/CMPASS.1994.318471","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318471","url":null,"abstract":"AeSOP (Aerospace Safety Oriented Petri Net) is an interactive failure mode analysis tool developed at The Aerospace Corporation. It automates a Petri net-based safety analysis technique developed by Leveson and Stolzy (1987) in which a reachability graph is analyzed backwards to identify potential failure modes of the system. AeSOP provides a flexible analytical environment where a user can arbitrarily assume the occurrence of \"unpredictable\" events and analyze their impacts to system behavior. It also implements several features designed to assist safety analysis on complex systems. This paper describes the use of AeSOP in performing failure-mode analysis using a simplified shuttle orbiter model where the impacts of a potential engine failure and the astronauts' selection of a recovery mechanism are analyzed. Finally, it describes enhancement plans to AeSOP.<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"553 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123513861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using formal methods to derive test frames in category-partition testing 用形式化方法推导类别划分测试中的测试框架
Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance Pub Date : 1994-06-27 DOI: 10.1109/CMPASS.1994.318466
P. Ammann, Jeff Offutt
{"title":"Using formal methods to derive test frames in category-partition testing","authors":"P. Ammann, Jeff Offutt","doi":"10.1109/CMPASS.1994.318466","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318466","url":null,"abstract":"Testing is a standard method of assuring that software performs as intended. We extend the category-partition method, which is a specification-based testing method. An important aspect of category-partition testing is the construction of test specifications as an intermediate between functional specifications and actual tests. We define a minimal coverage criterion for category-partition test specifications identify a mechanical process to produce a test specification that satisfies the criterion, and discuss the problem of resolving infeasible combinations of choices for categories. Our method uses formal schema-based functional specifications and is shown to be feasible with an example study of a simple file system.<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"237 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123751082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 155
Testability, testing, and critical software assessment 可测试性、测试和关键软件评估
Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance Pub Date : 1994-06-27 DOI: 10.1109/CMPASS.1994.318458
J. Voas
{"title":"Testability, testing, and critical software assessment","authors":"J. Voas","doi":"10.1109/CMPASS.1994.318458","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318458","url":null,"abstract":"Although the phrases \"critical system\" and \"critical software\" encompass different degrees of \"criticality\" based on the user and application, I consider critical software to be that which performs a task whose success is necessary to avoid a loss of property or life. Software testability is a software characteristic that refers to the ease with which some formal or informal testing criteria can be satisfied. There are varying metrics that can be applied to this measurement. Software validation generally refers to the process of showing that software is computing an expected function. Software testing is able to judge the quality of the code produced. Software testability, on the other hand, is not able to do so, because it has no information concerning whether the code is producing correct or incorrect results. It is only able to predict the likelihood of incorrect results occurring if a fault or faults exist in the code. Software testability is a validation technique, but in a different definition of the term /spl Gt/OPEN validation\" that the IEEE Standard Glossary of Software Engineering Terminology allows for. Software testability is assessing behavioral characteristics that are not related to whether the code is producing correct output.<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128244289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An approach for the risk analysis of safety specifications 安全规范的风险分析方法
Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance Pub Date : 1994-06-27 DOI: 10.1109/CMPASS.1994.318451
A. Saeed, R. de Lemos, T. Anderson
{"title":"An approach for the risk analysis of safety specifications","authors":"A. Saeed, R. de Lemos, T. Anderson","doi":"10.1109/CMPASS.1994.318451","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318451","url":null,"abstract":"Experience in safety-critical systems has shown that faults introduced during requirements analysis can and do cause accidents. Within a methodology for the systematic production of requirements specifications for safety, based on a framework to structure the analysis and the application of formal techniques, we focus, in this paper on the risk analysis of the specifications. This has the aim to locate and remove faults during the requirements phase, rather than later in development or during the operational lifetime of the system. The applicability of the proposed approach is demonstrated by conducting the risk analysis of an example based on a train set crossing. The example illustrates how the approach to risk analysis supports verification within a formal model and how the validation of the formal model is performed.<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132176282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
What is software reliability? 什么是软件可靠性?
Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance Pub Date : 1994-06-27 DOI: 10.1109/CMPASS.1994.318457
S. Dalal, Michael R. Lyu, C. Mallows, Bellcore
{"title":"What is software reliability?","authors":"S. Dalal, Michael R. Lyu, C. Mallows, Bellcore","doi":"10.1109/CMPASS.1994.318457","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318457","url":null,"abstract":"Reliability refers to statistical measures an engineer uses to quantify imperfection in practice. Often we speak imprecisely of an object having \"high reliability\", but technically, unless the object cannot fail at all, its reliability is arbitrarily close to zero for a long enough period of operation. This is merely an expression of the truism that an imperfect object must eventually fail. At first sight, it seems that software should have a sensible reliability, as other engineered objects do. But the application of the usual mathematics is not justified. Reliability theory applies to random (as opposed to systematic) variations in a population of similar objects, whereas software defects are all design flaws, not at all random, in a unique object. The traditional cause of failure is a random process of wear and tear, while software is forever as good (or as bad!) as new. However, software defects can be thought of as lurking in wait for the user requests that excite them, like a minefield through which the user must walk.<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"104 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120873037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 479
Covert channels-here to stay? 秘密渠道——会继续存在吗?
Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance Pub Date : 1994-06-27 DOI: 10.1109/CMPASS.1994.318449
I. S. Moskowitz, Myong H. Kang
{"title":"Covert channels-here to stay?","authors":"I. S. Moskowitz, Myong H. Kang","doi":"10.1109/CMPASS.1994.318449","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318449","url":null,"abstract":"We discuss the difficulties of satisfying high-assurance system requirements without sacrificing system capabilities. To alleviate this problem, we show how trade-offs can be made to reduce the threat of covert channels. We also clarify certain concepts in the theory of covert channels. Traditionally, a covert channel's vulnerability was measured by the capacity. We show why a capacity analysis alone is not sufficient to evaluate the vulnerability and introduce a new metric referred to as the \"small message criterion\".<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130975489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 154
Formal verification of an interactive consistency algorithm for the Draper FTP architecture under a hybrid fault model 混合故障模型下Draper FTP体系结构交互式一致性算法的形式化验证
Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance Pub Date : 1994-06-27 DOI: 10.1109/CMPASS.1994.318462
P. Lincoln, J. Rushby
{"title":"Formal verification of an interactive consistency algorithm for the Draper FTP architecture under a hybrid fault model","authors":"P. Lincoln, J. Rushby","doi":"10.1109/CMPASS.1994.318462","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318462","url":null,"abstract":"Fault-tolerant systems for critical applications should tolerate as many kinds of faults and as large a number of faults as possible, while using as little hardware as is feasible, and they should be provided with strong assurances for their correctness. Byzantine fault-tolerant architectures are attractive because they tolerate any kind fault, but they are rather expensive: at least 3m+1 processors are required to withstand m arbitrary faults. Two recent developments mitigate some of the costs: algorithms that operate under a hybrid fault model tolerate more faults for a given number of processors than classical Byzantine fault-tolerant algorithms, and asymmetric architectures tolerate a given number of faults with less hardware than conventional architectures. In this paper, we combine these two developments and present an algorithm for achieving interactive consistency (the problem of distributing sensor samples consistently in the presence of faults) under a hybrid fault model on an asymmetric architecture. The extended fault model and asymmetric architecture complicate the arguments for the correctness and the number of faults tolerated by the algorithm. To increase assurance, we have formally verified these properties and checked the proofs mechanically using the PVS verification system. We argue that mechanically supported formal methods allow for effective reuse of intellectual resources, such as specifications and proofs, and that exercises such as this can now be performed very economically.<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127387264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Testability: an introduction for COMPASS94 可测试性:COMPASS94的介绍
Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance Pub Date : 1994-06-27 DOI: 10.1109/CMPASS.1994.318455
K. Miller
{"title":"Testability: an introduction for COMPASS94","authors":"K. Miller","doi":"10.1109/CMPASS.1994.318455","DOIUrl":"https://doi.org/10.1109/CMPASS.1994.318455","url":null,"abstract":"Testability is the probability that software will fail during random testing if it contains a fault. Reliability and correctness are distinct from testability, though all three ideas are closely related. It is theoretically possible to have reliable and even correct software that is not very testable, but you would be hard-pressed to give a convincing demonstration that such software has attained that reliability or correctness. Three things have to happen before a fault in software becomes known during testing: the fault must be executed, that execution has to change the data state adversely, and that \"infected\" data state must cause an incorrect output. The three parts of this process are called execution, infection, and propagation. This three-part fault/failure process forms the basis of testability analysis. Testability analysis predicts for a given piece of software how likely it is that a fault in that software (if it exists) will cause a failure during random testing. We estimate this likelihood using sensitivity analysis.<<ETX>>","PeriodicalId":137767,"journal":{"name":"Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115501842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信