{"title":"沟通嵌入式系统建模和验证","authors":"S. Mili, Nga Nguyen, Rachid Chelouah","doi":"10.1109/SYSENG.2017.8088309","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a modeling and validation method for the communicating embedded systems. The approach consists of three steps. The first one introduces a SysML semi-formal representation of connected systems by extending the UML meta-model with a connectivity profile. The second step performs an automatic transformation from the semi-formal modeling represented in SysML, towards a formal representation expressed in the NuSMV, a transition based data flow language. The last step carries out the verification and validation of embedded systems against the propagation of errors through connected components, by using the NuSMV model checker. In order to consolidate our work, a case study on the vehicle Jeep Cherokee was chosen for its vulnerabilities against cyber-attacks. Our process will be applied to formally prove a design fault.","PeriodicalId":354846,"journal":{"name":"2017 IEEE International Systems Engineering Symposium (ISSE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Communicating embedded systems modeling and validation\",\"authors\":\"S. Mili, Nga Nguyen, Rachid Chelouah\",\"doi\":\"10.1109/SYSENG.2017.8088309\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we propose a modeling and validation method for the communicating embedded systems. The approach consists of three steps. The first one introduces a SysML semi-formal representation of connected systems by extending the UML meta-model with a connectivity profile. The second step performs an automatic transformation from the semi-formal modeling represented in SysML, towards a formal representation expressed in the NuSMV, a transition based data flow language. The last step carries out the verification and validation of embedded systems against the propagation of errors through connected components, by using the NuSMV model checker. In order to consolidate our work, a case study on the vehicle Jeep Cherokee was chosen for its vulnerabilities against cyber-attacks. Our process will be applied to formally prove a design fault.\",\"PeriodicalId\":354846,\"journal\":{\"name\":\"2017 IEEE International Systems Engineering Symposium (ISSE)\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE International Systems Engineering Symposium (ISSE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SYSENG.2017.8088309\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE International Systems Engineering Symposium (ISSE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SYSENG.2017.8088309","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Communicating embedded systems modeling and validation
In this paper, we propose a modeling and validation method for the communicating embedded systems. The approach consists of three steps. The first one introduces a SysML semi-formal representation of connected systems by extending the UML meta-model with a connectivity profile. The second step performs an automatic transformation from the semi-formal modeling represented in SysML, towards a formal representation expressed in the NuSMV, a transition based data flow language. The last step carries out the verification and validation of embedded systems against the propagation of errors through connected components, by using the NuSMV model checker. In order to consolidate our work, a case study on the vehicle Jeep Cherokee was chosen for its vulnerabilities against cyber-attacks. Our process will be applied to formally prove a design fault.