100% Coverage for Safety-Critical Software - Efficient Testing by Static Analysis

被引:0
|
作者
Kaestner, Daniel [1 ]
Heckmann, Reinhold [1 ]
Ferdinand, Christian [1 ]
机构
[1] AbsInt GmbH, D-66123 Saarbrucken, Germany
关键词
ABSTRACT INTERPRETATION;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Safety-critical embedded software is used more and more pervasively in the automotive, avionics and healthcare industries. Failures of such safety-critical embedded systems may cause high costs or even endanger human beings. Also for non-safety-critical applications, a software failure may necessitate expensive updates. Making sure that an application is working properly means addressing many different aspects. Development standards like DO-178B, IEC 61508 and the new revisions DO-178C, or ISO 26262 require to identify potential functional and non-functional hazards and to demonstrate that the software does not violate the relevant safety goals. For ensuring functional program properties automatic or model-based testing, and formal techniques like model checking become more and more widely used. For non-functional properties identifying a safe end-of-test criterion is a hard problem since failures usually occur in corner cases and full test coverage cannot be achieved. For some non-functional program properties this problem is solved by abstract interpretation-based static analysis techniques which provide full coverage and yield provably correct results. In this article we focus on static analyses of worst-case execution time, stack consumption, and runtime errors, which are increasingly adopted by industry in the validation and certification process for safety-critical software. We explain the underlying methodology and identify criteria for their successful application. The integration of static analyzers in the development process requires interfaces to other development tools, like code generators or scheduling tools. Using them for certification requires an appropriate tool qualification. We will address each of these topics and report on industrial experience.
引用
收藏
页码:196 / 209
页数:14
相关论文
共 50 条
  • [31] Changing safety-critical software
    Rierson, LK
    IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2001, 16 (06) : 25 - 30
  • [32] Verification of Safety-Critical Software
    Andersen, B. Scott
    Romanski, George
    COMMUNICATIONS OF THE ACM, 2011, 54 (10) : 52 - 57
  • [33] Efficient Software Tool Qualification for Automotive Safety-Critical Systems
    Astrom, Alexander
    Izosimov, Viacheslav
    Orsmark, Ola
    ELEKTRONIK IM KRAFTFAHRZEUG: ELEKTRIK, ELEKTRONIK, ELEKTROMOBILITAT, 2011, 2132 : 361 - 370
  • [34] Efficient engineering of safety-critical, software-intensive systems
    Taiber, Joachim
    McGregor, John D.
    2014 INTERNATIONAL CONFERENCE ON CONNECTED VEHICLES AND EXPO (ICCVE), 2014, : 836 - 841
  • [35] EVALUATION OF SAFETY-CRITICAL SOFTWARE
    PARNAS, DL
    VANSCHOUWEN, AJ
    KWAN, SP
    COMMUNICATIONS OF THE ACM, 1990, 33 (06) : 636 - 648
  • [36] An Approach for automated safety testing of safety-critical software system based on safety requirements
    Yu, Gang
    Xu, Zhong Wei
    Du, Jun Wei
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 166 - 169
  • [37] A tool for the design and analysis of software safety-critical systems
    Gill, JA
    Ferguson, F
    INFORMATION REUSE AND INTEGRATION, 2001, : 127 - 132
  • [38] An Ontological Analysis of Safety-Critical Software and Its Anomalies
    Liu, Hezhen
    Jin, Zhi
    Zheng, Zheng
    Huang, Chengqiang
    Zhang, Xun
    2022 IEEE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY, QRS, 2022, : 311 - 320
  • [39] Software reliability analysis for safety-critical and control systems
    Kumar, Pramod
    Singh, Lalit Kumar
    Kumar, Chiranjeev
    QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL, 2020, 36 (01) : 340 - 353
  • [40] Software tools for safety-critical software development
    Alan Wassyng
    Mark Lawford
    International Journal on Software Tools for Technology Transfer, 2006, 8 (4-5) : 337 - 354