Using Bounded Model Checking for Coverage Analysis of Safety-Critical Software in an Industrial Setting

被引:15
|
作者
Angeletti, Damiano [2 ]
Giunchiglia, Enrico [1 ]
Narizzano, Massimo [1 ]
Puddu, Alessandra [1 ]
Sabina, Salvatore [2 ]
机构
[1] Univ Genoa, DIST, I-16145 Genoa, Italy
[2] Ansaldo STS, I-16151 Genoa, Italy
关键词
Automatic test generation; Testing; Bounded model checking; GENERATION;
D O I
10.1007/s10817-010-9172-3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Testing and Bounded Model Checking (BMC) are two techniques used in Software Verification for bug-hunting. They are expression of two different philosophies: testing is used on the compiled code and it is more suited to find errors in common behaviors, while BMC is used on the source code to find errors in uncommon behaviors of the system. Nowadays, testing is by far the most used technique for software verification in industry: it is easy to use and even when no error is found, it can release a set of tests certifying the (partial) correctness of the compiled system. In the case of safety critical software, in order to increase the confidence of the correctness of the compiled system, it is often required that the provided set of tests covers 100% of the code. This requirement, however, substantially increases the costs associated to the testing phase, since it often involves the manual generation of tests. In this paper we show how BMC can be productively applied to the Software Verification process in industry. In particular, we show how to productively use a Bounded Model Checker for C programs (CBMC) as an automatic test generator for the Coverage Analysis of Safety Critical Software.
引用
收藏
页码:397 / 414
页数:18
相关论文
共 50 条
  • [41] Model-Driven Engineering and Safety-Critical Embedded Software
    Shukla, Sandeep K.
    COMPUTER, 2009, 42 (09) : 93 - 95
  • [42] Reliability modeling for safety-critical software
    Schneidewind, NF
    IEEE TRANSACTIONS ON RELIABILITY, 1997, 46 (01) : 88 - 98
  • [43] Can safety-critical software be flexible?
    Fraser, SW
    PROCEEDINGS OF THE 2003 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION, 2003, : 588 - 593
  • [44] Interactive Verification of Safety-Critical Software
    da Cruz, Daniela
    Henriques, Pedro Rangel
    Pinto, Jorge Sousa
    2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2013, : 519 - 528
  • [45] Software reuse: A safety-critical primer
    Wlad, Joseph
    IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2007, 22 (04) : 18 - 22
  • [46] Verification of requirements for safety-critical software
    Carpenter, PB
    ACM SIGADA ANNUAL INTERNATIONAL CONFERENCE (SIGADA'99) - PROCEEDINGS, 1999, 19 (03): : 23 - 29
  • [47] Toward dependable safety-critical software
    Bastani, F
    Cukic, B
    Hilford, V
    Jamoussi, A
    SECOND WORKSHOP ON OBJECT-ORIENTED REAL-TIME DEPENDABLE SYSTEMS, PROCEEDINGS OF WORDS '96, 1996, : 86 - 92
  • [48] On the formal development of safety-critical software
    Galloway, Andy
    Iwu, Frantz
    McDermid, John
    Toyn, Ian
    VERIFIED SOFTWARE: THEORIES, TOOLS, EXPERIMENTS, 2008, 4171 : 362 - 373
  • [49] An approach for testing safety-critical software
    Li, WW
    Xu, ZW
    Jin, Y
    NINTH GREAT LAKES SYMPOSIUM ON VLSI, PROCEEDINGS, 1999, : 180 - 183
  • [50] SAFETY-CRITICAL SOFTWARE - A RESEARCH AGENDA
    BERZTISS, AT
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 1994, 4 (02) : 165 - 181