期刊文献+

一种基于场景模型的安全性分析算法研究 被引量:2

Study on Safety Analysis Algorithm based on Scenario Model
下载PDF
导出
摘要 为了确保安全苛求系统的安全性,其开发过程中必须使用安全性分析技术。传统的安全性分析方法需要花费大量的时间和精力,分析的完整性和一致性难以保障,分析结果易于出错。本文提出一种基于场景模型的安全性分析算法,该算法从基于UML时序图的需求描述出发,生成系统的形式化模型,通过故障自动注入与形式化模型扩展,采用扩展的启发式广义büchi自动机判空检测算法自动验证与分析系统的安全性。通过铁路车站联锁系统中基本进路建立的安全性分析实例,验证了该方法的正确性与实际可行性。与已有的安全性分析方法相比,本文提出的方法从效率和安全质量方面改善了安全苛求软件的设计与开发,为安全苛求系统的安全性保障与安全评估提供了有力的技术支撑。 In order to ensure the safety of the safety-critical system,the safety analysis technology shall be adopted in development of the safety-critical system.The conventional safety analysis methods are labor intensive and time consuming are hard to guarantee analysis integrity and consistency and are easy to generate erroneous results.In this paper,we proposed the safety analysis algorithm based on the scenario model to resolve the problems of the conventional methods.With the proporsed algorithm,we built the FSP(Finite State Processes) process algebra models for the system and its components from UML sequence diagrams and domain knowledge,injected faults from the existing failure mode library to the formalized model of the system and acquired the extended formal models with failure behaviors automatically.We adopted the heuristic empty check algorithm with the extended generalized büchi automata to analyze and verify system safety automatically.As case study,safety analysis on establishment of receiving and sending routes in the railway station interlocking system proves the feasibility and correctness of the proposed method.Compared with the traditional methods,the proposed method improves the design and development of safety-critical software in respect of efficiency and quality and provides strong technical support to safety guarantee and evaluation of safety-critical computer systems.
作者 王曦 徐中伟
出处 《铁道学报》 EI CAS CSCD 北大核心 2012年第11期67-76,共10页 Journal of the China Railway Society
基金 国家科技支撑计划(2011BAG01B00) 国家自然科学基金(60674004 61075002)
关键词 场景模型 安全性分析 模型检测 scenario model safety analysis model checking
  • 相关文献

参考文献25

  • 1NEIL S.Safety Critical Computer Systems[M].Harlow,UK:Addison-wesley Longman,1996.
  • 2CENELEC.EN 50126Railway Applications:The Specifi-cation and Demonstration of Reliability,Availability,Main-tainability and Safety(RAMS)[S].Brussels:CENELEC,1999.
  • 3CENELEC.EN 50128Railway Applications:Communica-tions,Signalling and Processing Systems-software for Rail-way Control and Protection Systems[S].Brussels:CEN-ELEC,2001.
  • 4CENELEC.EN 50129Railway Applications:Safety-relatedElectronic Systems for Signaling[S].Brussels:CENELEC,1999.
  • 5IEC.IEC61508Functional Safety of Electrical/Electronic/Programmable Electronic Safety-related Systems-part3:Software Requirements[S].Geneva:IEC,2000.
  • 6CAFTA Fault Tree Analysis[EB/OL].http://software.cae.wisc.edu/package/cafta-fault-tree-analysis.
  • 7Windchill FMEA.[EB/OL].http://www.ptc.com/prod-ucts/windchill/fmea.
  • 8CAH(computer aided HAZOP)[EB/OL].http://www.strongdas.com/Index.aspx.
  • 9BOZZANO M,CAVALLO A,CIFALDI M,et al.Impro-ving Safety Assessment of Complex Systems:An Industri-al Case Study[C]//Proceedings of FM 2003.Berlin:Springer-verlag,2003:208-222.
  • 10JOSHI A,HEIMDAHL M P E.Model-based Safety A-nalysis of Simulink Models Using SCADE Design Verifier[C]//Proceedings of Computer Safety,Reliability and Se-curity.Fredrikstad,Norway:Springer-verlag,2005:122-135.

二级参考文献18

  • 1Baier C, Katoen J P. Principles of Model Checking[ M ]. Mas- sachusetts: The MIT Press, 2008.
  • 2Edelkamp S, Lafuente A L, Leue S. Directed explicit model checking with HSF-Spin[ A ]. Proceedings of the 8th Interna- tional SPIN Workshop on Model Checking of Software [ C ]. New Youk: Springer-Verlag, 2001.57 - 79.
  • 3Gerth R,Peled D,Vardi M Y,Wolper P. Simple on-the-fly au- tomatic verification of linear temporal logic[A] .Proceedings of PSTV'95[C] .London:Chapman & HaU,Ltd, 1995.3 - 18.
  • 4Giannakopoulou D, Lerda F. From states to transitions: improv- ing Iranslation of LTL formulae to btichi automata[ A]. Pro- ceedings of FORTE 2002 [ C ]. New Youk: Springer-Verlag, 2002.308 - 326.
  • 5Somenzi F, Bloem R. Efficient btichi automata from LTL for- mulae[ A]. Proceedings of CAV 2000[C]. London: Springer- Vedag, 2130. 247- 263.
  • 6Gaslin P, Oddoux D. Fast LTL to btichi automata Ixanslation [ A ]. Proceedings of CAV 2001 [ C ]. London: Springer- Verlag, 2001.53 - 65.
  • 7Schwoon S, Esparza J. A note on on-the-fly verification algo- rithms[ A]. Proceedings of TACAS' 05 [ C ]. London: Springer- Verlag, 2005.174 - 190.
  • 8Couvreur J M. On-the-fly verification of linera temporal logic [A ]. Proceedings of FM' 99 [ C ]. London: Springer-Verlag, 1999. 253 - 271.
  • 9Cema I, Pelanek R. Relating hierarchy of temporal properties to model checking[ A ]. Proceedings of MFCS'03[ C ]. Berlin: Springer-Verlag, 2003.318 - 327.
  • 10Geldenhuys J, Valmafi A. Tarjan' s algorithm makes on-the-flyLTL verification more efficient [ A ]. Proceedings of TACAS 2004 [ C ]. Berlin: Springer-Verlag, 2004.205 - 219.

共引文献4

同被引文献21

  • 1虞翊,吴芳美.基于黑箱的高速铁路联锁软件安全性测试策略[J].铁道学报,1997,19(S1):98-103. 被引量:3
  • 2张广泉,李力峰,戎玫,戴晔.基于IRCFG覆盖的UML顺序图测试方法[J].计算机科学,2006,33(12):270-273. 被引量:2
  • 3Ramaiah P S, Swarup M B, Kumar K R. Conceptual modeling for safety critical computer systems//Proceedings of the 9th ACIS on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. Phuket, Thailand, 2008:814-819.
  • 4Baier C, Katoen J P. Principles of Model Checking. Massa- chusetts: The MIT Press, 2008.
  • 5Giannakopoulou D, Lerda F. From states to transitions: Improving translation of LTL formulae to B:chi automata// Proceedings of the 22nd IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems. Houston, USA, 2002:308-326.
  • 6Gastin P, Oddoux D. Fast LTL to Bi:chi automata translation //Proceedings of the 13th International Conference on Computer Aided Verification. Paris, Franee, 2001:53-65.
  • 7Schwoon S, Esparza J. A note on on-the-fly verification algorithms//Proceedings of International Conference on Tools and Algorithms for Construction and Analysis of System. London, UK, 2005: 174-190.
  • 8Couvreur J M. On-the-fly verification of temporal logic// Proceedings of the World Congress on Formal Methods in the Development of Computing Systems. Toulouse, France, 1999:253-271.
  • 9Cerna I, Pelanek R. Relating hierarchy of temporal proper- ties to model checking//Proceedings of the 28th International Symposium on Mathe matical Foundations of Computer Science. Bratislava, Slovakia, 2003:318-327.
  • 10Geldenhuys J, Valmari A. Tarjan's algorithm makes on-the- fly LTL verification more efficient//Proceedings of the 10th International Conference on Tools and Algorithms for the Construction and Analysis of Systems. Berlin, Germany, 2004:205-219.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部