{"title":"使用MALPAS工具对军械软件进行分析","authors":"K. Hayman","doi":"10.1109/CMPASS.1990.175404","DOIUrl":null,"url":null,"abstract":"Results of using the MALPAS static analysis package are presented, both as they relate to the specific software being analyzed and more generally in terms of the experience and insight gained into the application of static analysis techniques to the verification of real-time software. The translation of the software into the intermediate language used by the MALPAS analyzers, the results of code analysis, the answers to questions posed about the software, and the conclusions arising from the analysis are discussed. Two significant safety-related flaws were detected during the analysis, one in the software itself and the other in the specification of the device. Comparisons are made between the findings of the analysis and currently proposed standards for writing safety-critical software.<<ETX>>","PeriodicalId":122768,"journal":{"name":"Fifth Annual Conference on Computer Assurance, Systems Integrity, Software Safety and Process Security.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1990-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"An analysis of ordnance software using the MALPAS tools\",\"authors\":\"K. Hayman\",\"doi\":\"10.1109/CMPASS.1990.175404\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Results of using the MALPAS static analysis package are presented, both as they relate to the specific software being analyzed and more generally in terms of the experience and insight gained into the application of static analysis techniques to the verification of real-time software. The translation of the software into the intermediate language used by the MALPAS analyzers, the results of code analysis, the answers to questions posed about the software, and the conclusions arising from the analysis are discussed. Two significant safety-related flaws were detected during the analysis, one in the software itself and the other in the specification of the device. Comparisons are made between the findings of the analysis and currently proposed standards for writing safety-critical software.<<ETX>>\",\"PeriodicalId\":122768,\"journal\":{\"name\":\"Fifth Annual Conference on Computer Assurance, Systems Integrity, Software Safety and Process Security.\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1990-06-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Fifth Annual Conference on Computer Assurance, Systems Integrity, Software Safety and Process Security.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CMPASS.1990.175404\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Fifth Annual Conference on Computer Assurance, Systems Integrity, Software Safety and Process Security.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CMPASS.1990.175404","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An analysis of ordnance software using the MALPAS tools
Results of using the MALPAS static analysis package are presented, both as they relate to the specific software being analyzed and more generally in terms of the experience and insight gained into the application of static analysis techniques to the verification of real-time software. The translation of the software into the intermediate language used by the MALPAS analyzers, the results of code analysis, the answers to questions posed about the software, and the conclusions arising from the analysis are discussed. Two significant safety-related flaws were detected during the analysis, one in the software itself and the other in the specification of the device. Comparisons are made between the findings of the analysis and currently proposed standards for writing safety-critical software.<>